General

  • Target

    Client-deobf.exe

  • Size

    3.1MB

  • Sample

    240324-vw7g5aea25

  • MD5

    d7471180a1a335178c8062f57e2238f2

  • SHA1

    f3e821ce5d1769feb271408746dbccb39e17a9ec

  • SHA256

    520d3a1acd104bda412c4b6b118b2c4177fa5ae9c0294c18d8d81a5c604e946f

  • SHA512

    420eef19289b550a2cdac7227e6c82ceff3e570bd2d37dadcd617804d16492913ecd7acef84d7962e1b081fe701bc3f609728e765a1829b8f597092c51dc6a84

  • SSDEEP

    49152:H9taZ7HYaFI1ITamlivhumFgWdFxUhxGqTHHB72eh2NT:H9tapHYaFI1ITamliJumFg0x

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Slave

C2

140.238.91.110:34353

Mutex

25ab9d56-6ef2-47d3-99aa-2142fbcd41fa

Attributes
  • encryption_key

    8E710985199C6BF86CCE90DA92448A36E2F45F51

  • install_name

    XWormV5.6.exe

  • log_directory

    WindowsUPDLogs

  • reconnect_delay

    3000

  • startup_key

    Windows BIOS Update Checker

  • subdirectory

    SubDir

Targets

    • Target

      Client-deobf.exe

    • Size

      3.1MB

    • MD5

      d7471180a1a335178c8062f57e2238f2

    • SHA1

      f3e821ce5d1769feb271408746dbccb39e17a9ec

    • SHA256

      520d3a1acd104bda412c4b6b118b2c4177fa5ae9c0294c18d8d81a5c604e946f

    • SHA512

      420eef19289b550a2cdac7227e6c82ceff3e570bd2d37dadcd617804d16492913ecd7acef84d7962e1b081fe701bc3f609728e765a1829b8f597092c51dc6a84

    • SSDEEP

      49152:H9taZ7HYaFI1ITamlivhumFgWdFxUhxGqTHHB72eh2NT:H9tapHYaFI1ITamliJumFg0x

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks