General

  • Target

    BloxStrap v2.5.4.1.exe

  • Size

    3.1MB

  • Sample

    240510-qfhfvabe87

  • MD5

    4fe3f16488126ea4b072fc6fcfc910b0

  • SHA1

    ba0b203f96f771e61d952ab925b773ac475a141b

  • SHA256

    52f9d1a2c3d4518da21b3426a0ccefb04e07316755f97de9eaaecc1e09c4b5c7

  • SHA512

    782a429364de283c8bda39c6f0ffc07847fe3d580a4f0280a9ccd75aeb6420280fe1d0b1a6e61cbd176d8f6fd331b50780c7f8239bff81b6eaf55ae647477697

  • SSDEEP

    49152:uvEt62XlaSFNWPjljiFa2RoUYIjyDHTmzopoGdSweTHHB72eh2NT:uvY62XlaSFNWPjljiFXRoUYIjyDHh

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.1.114:4782

Mutex

10d94abb-0198-407e-aa98-bb80c5b37835

Attributes
  • encryption_key

    45C885494447187E9FBAD6C4E1ACD4A1590FC706

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Runtime

  • subdirectory

    SubDir

Targets

    • Target

      BloxStrap v2.5.4.1.exe

    • Size

      3.1MB

    • MD5

      4fe3f16488126ea4b072fc6fcfc910b0

    • SHA1

      ba0b203f96f771e61d952ab925b773ac475a141b

    • SHA256

      52f9d1a2c3d4518da21b3426a0ccefb04e07316755f97de9eaaecc1e09c4b5c7

    • SHA512

      782a429364de283c8bda39c6f0ffc07847fe3d580a4f0280a9ccd75aeb6420280fe1d0b1a6e61cbd176d8f6fd331b50780c7f8239bff81b6eaf55ae647477697

    • SSDEEP

      49152:uvEt62XlaSFNWPjljiFa2RoUYIjyDHTmzopoGdSweTHHB72eh2NT:uvY62XlaSFNWPjljiFXRoUYIjyDHh

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks