General

  • Target

    Susano1.2.8.4.exe

  • Size

    3.1MB

  • Sample

    240222-r438wsbf77

  • MD5

    498e6ea83d15de9992d85def43a2dbed

  • SHA1

    8ee13f8f6e837969b3d7f436ad4c2289697d2e28

  • SHA256

    03eeaf1a696b1ea49360ec5627e16ed94a0766871fe6cd59c94ea939578d0cd8

  • SHA512

    a65a9d14b834063271009529f25800022ebeb26b67f65821e18be0e6baf06a2deb0deb7b28c5ab90cda0b176d6db327d2d86abdee517e68d8bb837e5622299ec

  • SSDEEP

    49152:Svkt62XlaSFNWPjljiFa2RoUYIgeaHsk2vGZLoGA1THHB72eh2NT:Sv462XlaSFNWPjljiFXRoUYIvk5

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.1.17:4782

Mutex

5f210934-2354-4459-805f-4058e2fbbc65

Attributes
  • encryption_key

    E1F939A59A57A4E0EEC874A8DA31E5D32414EEAA

  • install_name

    Client.exe

  • log_directory

    susano

  • reconnect_delay

    3000

  • startup_key

    discord32

  • subdirectory

    SubDir

Targets

    • Target

      Susano1.2.8.4.exe

    • Size

      3.1MB

    • MD5

      498e6ea83d15de9992d85def43a2dbed

    • SHA1

      8ee13f8f6e837969b3d7f436ad4c2289697d2e28

    • SHA256

      03eeaf1a696b1ea49360ec5627e16ed94a0766871fe6cd59c94ea939578d0cd8

    • SHA512

      a65a9d14b834063271009529f25800022ebeb26b67f65821e18be0e6baf06a2deb0deb7b28c5ab90cda0b176d6db327d2d86abdee517e68d8bb837e5622299ec

    • SSDEEP

      49152:Svkt62XlaSFNWPjljiFa2RoUYIgeaHsk2vGZLoGA1THHB72eh2NT:Sv462XlaSFNWPjljiFXRoUYIvk5

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks