General

  • Target

    Uni.exe

  • Size

    409KB

  • Sample

    240512-xyp2zacb3s

  • MD5

    a9992c5f2a2abd7200e02870adf941ec

  • SHA1

    8a129b6b673a1101f5237d855afa2f304eb3243c

  • SHA256

    c33f54f474ed1ee7aabaeb1519fab4abcd37807524164bcef2d53d5e7389377d

  • SHA512

    226202be4d51f2703bdb201c4347c0bc67e1426900561abd2f706a0df3cb401bab64805bf33b3c8fb77e1a9a4a8c92d69bb544ae2da9df98b2874c42dc4f6e1b

  • SSDEEP

    6144:MMr2pJAJcC0B6x5BA0kFda2UFw43YKqb/OMrtylMJb1nCD8aXh:8pyJcC+a5BA0kF/U50OMROQb9vaXh

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

SLAVE

C2

review-tops.gl.at.ply.gg:48212

Mutex

$Sxr-IGnkORFTlshRl7BdTw

Attributes
  • encryption_key

    YDmRBA8wExjQkYgGrHhN

  • install_name

    $sxr-powershell.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Discord

  • subdirectory

    $77

Targets

    • Target

      Uni.exe

    • Size

      409KB

    • MD5

      a9992c5f2a2abd7200e02870adf941ec

    • SHA1

      8a129b6b673a1101f5237d855afa2f304eb3243c

    • SHA256

      c33f54f474ed1ee7aabaeb1519fab4abcd37807524164bcef2d53d5e7389377d

    • SHA512

      226202be4d51f2703bdb201c4347c0bc67e1426900561abd2f706a0df3cb401bab64805bf33b3c8fb77e1a9a4a8c92d69bb544ae2da9df98b2874c42dc4f6e1b

    • SSDEEP

      6144:MMr2pJAJcC0B6x5BA0kFda2UFw43YKqb/OMrtylMJb1nCD8aXh:8pyJcC+a5BA0kF/U50OMROQb9vaXh

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks