Resubmissions

01-10-2023 00:42

231001-a2v13agb7v 10

01-10-2023 00:39

231001-azmlxahf45 10

30-09-2023 17:31

230930-v3wdfafh25 10

General

  • Target

    vcac.exe

  • Size

    24.2MB

  • Sample

    231001-azmlxahf45

  • MD5

    bd60bf2d7f1f2f813f22005f645b54a6

  • SHA1

    f26fd66a37d21522bcc3bb95dd1a0af12d3978cc

  • SHA256

    b416ba3614cf4d62af4a1a558d2ca647ecf8196b251217e6d5809f5044bb4d9b

  • SHA512

    1522830159961b626f0b16bdc5daa1923f7a911b7a80718143fe8cf6737bd86f25425d23badb7137319ed80afedf0a70914dfd40a071bde1507ab4d9bb999cc9

  • SSDEEP

    98304:qKBbBWIgWljGxRB/LLqvc22SsaNYfdPBldt6+dBcjHVCU688cIyGOk3ta:P4xRBj4B7j4U6gl

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    1

Extracted

Family

quasar

Version

1.4.1

Botnet

user

C2

192.168.0.13:3440

elpepemanca.ddns.net:3440

Mutex

5950a87d-00d0-4fc0-a953-61143318e6d1

Attributes
  • encryption_key

    1A866C514D7B8C5F02AAA72B847C1F305295B74C

  • install_name

    Windows.exe

  • log_directory

    Logs

  • reconnect_delay

    1

  • startup_key

    Discord.exe

  • subdirectory

    System

Targets

    • Target

      vcac.exe

    • Size

      24.2MB

    • MD5

      bd60bf2d7f1f2f813f22005f645b54a6

    • SHA1

      f26fd66a37d21522bcc3bb95dd1a0af12d3978cc

    • SHA256

      b416ba3614cf4d62af4a1a558d2ca647ecf8196b251217e6d5809f5044bb4d9b

    • SHA512

      1522830159961b626f0b16bdc5daa1923f7a911b7a80718143fe8cf6737bd86f25425d23badb7137319ed80afedf0a70914dfd40a071bde1507ab4d9bb999cc9

    • SSDEEP

      98304:qKBbBWIgWljGxRB/LLqvc22SsaNYfdPBldt6+dBcjHVCU688cIyGOk3ta:P4xRBj4B7j4U6gl

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Disables Task Manager via registry modification

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Possible privilege escalation attempt

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks