General

  • Target

    Client-built.bat

  • Size

    1.9MB

  • Sample

    240512-sj843sbg3w

  • MD5

    44523454be47061f187cfdc2ec60834a

  • SHA1

    86136762b9296ef6517bc01b7764e59398bab09b

  • SHA256

    5a88206b2a68e2c0175d091b3a0c7b133a1b35740b4acc33f5aaebe23fc97e46

  • SHA512

    4c5f35a45ff1cfc394e19bbf1e4080fd43ea2ef9880b16b6fc316c85dc7fbdb222d03821224b3eac90a971c8f69a05ac96d86f7367cad658cfb229bf5f966080

  • SSDEEP

    24576:kxASqRPmTwkE+UrVuwEQ6/RZhDGYAiM37i9yfela6S2ZZoB+a7ZpFifK7+tLe61s:k+TEwl7Q865Zuimi7/E4mp7kScR0

Malware Config

Extracted

Family

quasar

Version

1.0.0

Botnet

New

C2

even-lemon.gl.at.ply.gg:33587

Mutex

2bce5514-d527-4787-825c-3042f9dd5ede

Attributes
  • encryption_key

    501DB7A849356BF2C272A70D53FAF39F17D4245C

  • install_name

    WinHost32.exe

  • log_directory

    UpdateLogs

  • reconnect_delay

    3000

  • startup_key

    Powershell

  • subdirectory

    System32

Targets

    • Target

      Client-built.bat

    • Size

      1.9MB

    • MD5

      44523454be47061f187cfdc2ec60834a

    • SHA1

      86136762b9296ef6517bc01b7764e59398bab09b

    • SHA256

      5a88206b2a68e2c0175d091b3a0c7b133a1b35740b4acc33f5aaebe23fc97e46

    • SHA512

      4c5f35a45ff1cfc394e19bbf1e4080fd43ea2ef9880b16b6fc316c85dc7fbdb222d03821224b3eac90a971c8f69a05ac96d86f7367cad658cfb229bf5f966080

    • SSDEEP

      24576:kxASqRPmTwkE+UrVuwEQ6/RZhDGYAiM37i9yfela6S2ZZoB+a7ZpFifK7+tLe61s:k+TEwl7Q865Zuimi7/E4mp7kScR0

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks