Resubmissions

22-04-2024 15:01

240422-sd558scg4v 10

22-04-2024 14:58

240422-sch93scg21 10

General

  • Target

    TangoGen.rar

  • Size

    43.6MB

  • Sample

    240422-sd558scg4v

  • MD5

    58499bbb694ff3a09362d57e35c660c7

  • SHA1

    8fb1d6c6ff24b9710e78fddce0a3ed20201ccf96

  • SHA256

    eb6f8f2a7f814d765640c5e6422921576383c85183677c8c1328f846bda5906e

  • SHA512

    bb60444d0c0e91759bc6737a79d1cdb1e678b853fefc0e254a30d3455dcbd4c929847272e2a8f8ef779b6991f1aed44691a10a772c9920dca2a2298fb9a22b89

  • SSDEEP

    786432:vBD907AA6x8fc79JOuWYdlWp7vzi9DzsOfRuCgIyM25jtJwiS7Sh7IbaHuFJ9W:ZD906GW9JOufd99DwSRu/z1avJ9W

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

6.tcp.ngrok.io:16799

Mutex

0c20af10-1b0a-4d0e-bbca-3718ee39e827

Attributes
  • encryption_key

    284202D1B7ED732612BB54048953C4453A2549F9

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    System32

  • subdirectory

    SubDir

Targets

    • Target

      TangoGen/TangoGenV1.3.EXE

    • Size

      52.0MB

    • MD5

      e9150812ffb2317a7ff1a2491a392ade

    • SHA1

      6b929ee7d7555604ec71d2463b6c1602aaf38b75

    • SHA256

      0e01eb02101b4aa05e0484ac9caebb77a7ecda7a36263aac8a32225fa2a8d38a

    • SHA512

      7a7a5c6c29848e5a2f1c12753c6bf9900937b99fd5e07cfb6fc6793216361bc7962fbd0a2b29448bae1c028ab93c11640f176cf5d3897a64973dd954ff417914

    • SSDEEP

      1572864:CxLPRJ/aHOlj/wZuj/hzJHW2ldP2dUOpfa4X62AC:CH2Mhzn+dUSh

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Target

      TangoGen/assets.dll

    • Size

      5.1MB

    • MD5

      773b3b72481fd8ef9b62b5ef0fe8040a

    • SHA1

      a42cbc7aab88689e834c158b24af8722586cf1b4

    • SHA256

      7f93fef11819a9f4b8edd342a1c2d3dbab25698ed75f9713ee1167fa2f852331

    • SHA512

      db7d29100060afc909cbf20bcd6d9c02fc0b29d8ee32606e2d6cf18270484f2b46853cda0b495a85cc7a2e3ae4536030a25216f101dceabf2f972e3375208c38

    • SSDEEP

      768:+UI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUI7yUIn:3

    Score
    1/10

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

Command and Control

Web Service

1
T1102

Tasks