General

  • Target

    20bde1fda3d779a90e7c7b9ff305707a.bin

  • Size

    3.1MB

  • Sample

    231211-bn62vahcdk

  • MD5

    20bde1fda3d779a90e7c7b9ff305707a

  • SHA1

    41f4d3975a698602b59b1a333d2ff338ab4046b2

  • SHA256

    38da47e30f2fdac36749e0cbf2670c00fcff778f5ca9c543734271cce7116be9

  • SHA512

    c9bead404244d75a341d694c7ccad051f12b0f6a4194793072dfa87e1b4ed4e4cfe9ab2732ef758c311c1b93df7a6da94103e252012f81781423fc9163cb4be8

  • SSDEEP

    49152:XvClL26AaNeWgPhlmVqvMQ7XSKXOBrmMf/IoGdEJbTHHB72eh2NT:Xv6L26AaNeWgPhlmVqkQ7XSKXOBrG

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

VM

C2

192.168.1.9:4782

Mutex

6c756287-c4ff-4a15-a573-78b63a105013

Attributes
  • encryption_key

    6964046A47D2126B973C642C58E5CF169F21AB76

  • install_name

    HWIDUnbanFN.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    WindowsDefenderService

  • subdirectory

    WindowsSubFolder

Targets

    • Target

      20bde1fda3d779a90e7c7b9ff305707a.bin

    • Size

      3.1MB

    • MD5

      20bde1fda3d779a90e7c7b9ff305707a

    • SHA1

      41f4d3975a698602b59b1a333d2ff338ab4046b2

    • SHA256

      38da47e30f2fdac36749e0cbf2670c00fcff778f5ca9c543734271cce7116be9

    • SHA512

      c9bead404244d75a341d694c7ccad051f12b0f6a4194793072dfa87e1b4ed4e4cfe9ab2732ef758c311c1b93df7a6da94103e252012f81781423fc9163cb4be8

    • SSDEEP

      49152:XvClL26AaNeWgPhlmVqvMQ7XSKXOBrmMf/IoGdEJbTHHB72eh2NT:Xv6L26AaNeWgPhlmVqkQ7XSKXOBrG

    Score
    10/10
    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks