General

  • Target

    39d0db6e95e2a7e23fcd637085f8496d_JaffaCakes118

  • Size

    1.8MB

  • Sample

    240512-nc3aqsce4y

  • MD5

    39d0db6e95e2a7e23fcd637085f8496d

  • SHA1

    5293d9124ca789c27c77ee9f2a27dbdbd5a619f2

  • SHA256

    070ad3ab33bffaf96b8638b302117cde7f4f417759b00f8497b1a1c076844575

  • SHA512

    f07ebd353dc6a0e87481d6a5e3abe9beaf7ed337eae4acdda7074aa84ef09dfe30835f9ccf764584676453fdaa17fe96f077815ad01c885f08e786eacd2a3f3f

  • SSDEEP

    12288:5WyG8PdU1cWK84twtShjMXoT8hke1X3v7F:3G8POL4twIhw4T8hke1HR

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    1250

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Office04

C2

dedi001.dynip.online:1604

Mutex

QSR_MUTEX_fUMlvet13pGJVZGtTl

Attributes
  • encryption_key

    cmUQwSOc5zCRWKiUUZBH

  • install_name

    audiodg.exe

  • log_directory

    Logs

  • reconnect_delay

    1250

  • startup_key

    Cortana

  • subdirectory

    temp000

Targets

    • Target

      39d0db6e95e2a7e23fcd637085f8496d_JaffaCakes118

    • Size

      1.8MB

    • MD5

      39d0db6e95e2a7e23fcd637085f8496d

    • SHA1

      5293d9124ca789c27c77ee9f2a27dbdbd5a619f2

    • SHA256

      070ad3ab33bffaf96b8638b302117cde7f4f417759b00f8497b1a1c076844575

    • SHA512

      f07ebd353dc6a0e87481d6a5e3abe9beaf7ed337eae4acdda7074aa84ef09dfe30835f9ccf764584676453fdaa17fe96f077815ad01c885f08e786eacd2a3f3f

    • SSDEEP

      12288:5WyG8PdU1cWK84twtShjMXoT8hke1X3v7F:3G8POL4twIhw4T8hke1HR

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks