General

  • Target

    Quasar.v1.4.1.zip

  • Size

    3.3MB

  • Sample

    240420-mecbnaeh2w

  • MD5

    13aa4bf4f5ed1ac503c69470b1ede5c1

  • SHA1

    c0b7dadff8ac37f6d9fd00ae7f375e12812bfc00

  • SHA256

    4cdeb2eae1cec1ab07077142313c524e9cf360cdec63497538c4405c2d8ded62

  • SHA512

    767b03e4e0c2a97cb0282b523bcad734f0c6d226cd1e856f6861e6ae83401d0d30946ad219c8c5de3c90028a0141d3dc0111c85e0a0952156cf09e189709fa7d

  • SSDEEP

    49152:lYLmNgMh/9yUsRFeWMyYISDSwtfxZQNemi57PdHmeFINp/lFnsDbNFNepL6DJo+J:mL9U1yUUQykOQ91XFYBlR8P9d5uNJo9

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    5000

Extracted

Family

quasar

Version

1.4.1

Botnet

GTA 6

C2

10.127.0.96:4782

Mutex

81a47054-8dec-4dcb-8419-2f172f579b60

Attributes
  • encryption_key

    D407F342C59CD416FA1A5CB9680EBE980661182A

  • install_name

    Client.exe

  • log_directory

    LOGS

  • reconnect_delay

    3000

  • startup_key

    Windows Updates

  • subdirectory

    SubDir

Targets

    • Target

      Quasar.v1.4.1.zip

    • Size

      3.3MB

    • MD5

      13aa4bf4f5ed1ac503c69470b1ede5c1

    • SHA1

      c0b7dadff8ac37f6d9fd00ae7f375e12812bfc00

    • SHA256

      4cdeb2eae1cec1ab07077142313c524e9cf360cdec63497538c4405c2d8ded62

    • SHA512

      767b03e4e0c2a97cb0282b523bcad734f0c6d226cd1e856f6861e6ae83401d0d30946ad219c8c5de3c90028a0141d3dc0111c85e0a0952156cf09e189709fa7d

    • SSDEEP

      49152:lYLmNgMh/9yUsRFeWMyYISDSwtfxZQNemi57PdHmeFINp/lFnsDbNFNepL6DJo+J:mL9U1yUUQykOQ91XFYBlR8P9d5uNJo9

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks