General

  • Target

    a5473ea4c4ef75c217e0d252d1c7d235b781a75810b7e731a97ed78b45646840

  • Size

    3.1MB

  • Sample

    240423-cdvrhabd91

  • MD5

    2c1fba8d6624adf6c582fb2d5fb43b28

  • SHA1

    bd45ee984e9476d604824f83c6cf6111a9db2467

  • SHA256

    a5473ea4c4ef75c217e0d252d1c7d235b781a75810b7e731a97ed78b45646840

  • SHA512

    cc85b5f1c2765c49f34c236634dcbfdfd6cc62e0b954b74c12b0d89dc29044dff88a9840e5c02a39e140564283074c78359dd70dfc7f426daefb75f195f14e19

  • SSDEEP

    49152:nvVG42pda6D+/PjlLOlg6yQipV6iRJ67bR3LoGdTqTHHB72eh2NT:nvM42pda6D+/PjlLOlZyQipV6iRJ6ND

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

funlink.ddns.net:4444

quasarhost1.ddns.net:4444

Mutex

c363b2f8-fc6a-4abd-a753-cff1aad2a173

Attributes
  • encryption_key

    CE5FBAC1A56C8C780C74FE8E7CD5CBCF8ABD6C8D

  • install_name

    updale.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    windows av startup

  • subdirectory

    SubDir

Targets

    • Target

      a5473ea4c4ef75c217e0d252d1c7d235b781a75810b7e731a97ed78b45646840

    • Size

      3.1MB

    • MD5

      2c1fba8d6624adf6c582fb2d5fb43b28

    • SHA1

      bd45ee984e9476d604824f83c6cf6111a9db2467

    • SHA256

      a5473ea4c4ef75c217e0d252d1c7d235b781a75810b7e731a97ed78b45646840

    • SHA512

      cc85b5f1c2765c49f34c236634dcbfdfd6cc62e0b954b74c12b0d89dc29044dff88a9840e5c02a39e140564283074c78359dd70dfc7f426daefb75f195f14e19

    • SSDEEP

      49152:nvVG42pda6D+/PjlLOlg6yQipV6iRJ67bR3LoGdTqTHHB72eh2NT:nvM42pda6D+/PjlLOlZyQipV6iRJ6ND

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables containing common artifacts observed in infostealers

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks