General

  • Target

    1a9fc6d523ce020286a56241c37badcf.bin

  • Size

    1.2MB

  • Sample

    240111-bg8l4abfbj

  • MD5

    4e1a0e1df39670cd89801947255b9bf4

  • SHA1

    d58be6e00aa72abfaed28e4fcace613ecb2df535

  • SHA256

    22d49f7329fb60fee6b0e67e0ca48934d0edc9a2e87bf30bf6af8b9fe232b878

  • SHA512

    07a4ab38d4942b0871dece06d0e55ae9a6c0839108471d72b5655c8acca8000d11759d11929365ce3d64f23b7e2ca313c46eed27b4b6aa578f0e8a7d4ece6efe

  • SSDEEP

    24576:rvYAetFQ/bHxeK/9TuE65StZi+R2+muHRVdMJXmGJJ78u22b:rgHFQ/boA0StZi6JbxHMJXmGJN320

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Yadu Desktop

C2

192.168.0.117:5952

Mutex

7c1aa5fc-2493-4922-84eb-b0c9e594a178

Attributes
  • encryption_key

    288DD8FDFEEFAB4F6D1AF0DB22F3D719A454FE7C

  • install_name

    Realtek.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Realtek Audio Manager

  • subdirectory

    Realtek Audio Manager

Targets

    • Target

      2f511d2b5082a059bbc56ddd78b3a2dbe221941f70b42d1e7740dbdcd4a5be12.exe

    • Size

      3.1MB

    • MD5

      1a9fc6d523ce020286a56241c37badcf

    • SHA1

      f68451dece1943443ac6a77cceb4bb447eaeb5dc

    • SHA256

      2f511d2b5082a059bbc56ddd78b3a2dbe221941f70b42d1e7740dbdcd4a5be12

    • SHA512

      11f731dea0d621be05d090e634b352e10ed7f0df19808561e1be030175ddc22c84fd614a70af838824da8daa2a56871fc0969686c4245846c01ef08d0f72ed61

    • SSDEEP

      49152:fvLlL26AaNeWgPhlmVqvMQ7XSKwXRJ6abR3LoGdu5THHB72eh2NT:fvxL26AaNeWgPhlmVqkQ7XSKwXRJ60

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks