General

  • Target

    4e0a39ab057a9e884255df35dbf240ca_JaffaCakes118

  • Size

    711KB

  • Sample

    240517-czyqaade58

  • MD5

    4e0a39ab057a9e884255df35dbf240ca

  • SHA1

    9f431640264b1cbf5d8a9666d33c868a1e6ebfd7

  • SHA256

    4a95103a4f893c6c17b66af8f872093b97d836f6277195e1c60339341da4f276

  • SHA512

    7963afa8b19329b53e2fb12751ea04cceba8f58401315b16f21b300c555f5a8c4473ec19aec694a7f32789fa243dc0f8edc3247463a6f3551bff99fe858069a4

  • SSDEEP

    12288:B8JsIitBttf+zZa7oPNr3JfjLxEwvmcmsq43reb+z3vt4snmMszSN:CaBJeK0r5hVvlRqEreq7WbY

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

1805

C2

allahoyunda.duckdns.org:1604

Mutex

QSR_MUTEX_Fq5eq2CLhdcvCvtnCW

Attributes
  • encryption_key

    35KaV9hUWCm5Me7Z03OO

  • install_name

    svchosts.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    java

  • subdirectory

    svchost

Targets

    • Target

      4e0a39ab057a9e884255df35dbf240ca_JaffaCakes118

    • Size

      711KB

    • MD5

      4e0a39ab057a9e884255df35dbf240ca

    • SHA1

      9f431640264b1cbf5d8a9666d33c868a1e6ebfd7

    • SHA256

      4a95103a4f893c6c17b66af8f872093b97d836f6277195e1c60339341da4f276

    • SHA512

      7963afa8b19329b53e2fb12751ea04cceba8f58401315b16f21b300c555f5a8c4473ec19aec694a7f32789fa243dc0f8edc3247463a6f3551bff99fe858069a4

    • SSDEEP

      12288:B8JsIitBttf+zZa7oPNr3JfjLxEwvmcmsq43reb+z3vt4snmMszSN:CaBJeK0r5hVvlRqEreq7WbY

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks