General

  • Target

    7956213b0feb9c89bdafa46413d2e82e

  • Size

    1.0MB

  • Sample

    240127-fndshsdgb9

  • MD5

    7956213b0feb9c89bdafa46413d2e82e

  • SHA1

    1991848a89b5f7f8414f019832db3babb5fe98eb

  • SHA256

    f6624296b09e13669e59c25c1a1fc7ea36a546a1b3d09ff3c5a3e141d48596cf

  • SHA512

    709bf96660c7ca044ceb4a399b661fed9d4780b50b22d136851eaa5377e7b4076b237c44a206a02f92221d169a70c37809e02683f7714b815c1504ba7ba666a3

  • SSDEEP

    24576:pquRaKXDFJPtThHFLYuMCIh1EeltkTFT9:EuRaKXDFJPtThHFLYuMCIfEeltS

Malware Config

Extracted

Family

quasar

Version

2.7.0.0

Botnet

Venom Client

C2

internetip.ddns.net:3355

Mutex

1sYhRUF2UYppFyU5Wy

Attributes
  • encryption_key

    xv1VPAwqQKw1BU4IV6By

  • install_name

    Venom.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Venom Client Startup

Targets

    • Target

      7956213b0feb9c89bdafa46413d2e82e

    • Size

      1.0MB

    • MD5

      7956213b0feb9c89bdafa46413d2e82e

    • SHA1

      1991848a89b5f7f8414f019832db3babb5fe98eb

    • SHA256

      f6624296b09e13669e59c25c1a1fc7ea36a546a1b3d09ff3c5a3e141d48596cf

    • SHA512

      709bf96660c7ca044ceb4a399b661fed9d4780b50b22d136851eaa5377e7b4076b237c44a206a02f92221d169a70c37809e02683f7714b815c1504ba7ba666a3

    • SSDEEP

      24576:pquRaKXDFJPtThHFLYuMCIh1EeltkTFT9:EuRaKXDFJPtThHFLYuMCIfEeltS

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Remote System Discovery

1
T1018

Command and Control

Web Service

1
T1102

Tasks