General

  • Target

    a5aa53a0c804e4ca657a4f27cd1c02c0_NeikiAnalytics.exe

  • Size

    3.1MB

  • Sample

    240517-ex2p9sha6x

  • MD5

    a5aa53a0c804e4ca657a4f27cd1c02c0

  • SHA1

    0ee279c8084ef985c4525b5d2f494c28c5795e8e

  • SHA256

    a0b392d3c49dc9b3b763b6ad04984877f6ab7652a09630faa5b7058a19c81a5f

  • SHA512

    cf59cb9797901a7a2cf447d2bb468996728a8c135e40978c545696e076f82b3faeae47681afb05498df856042d253cc16800d1dba57f89594428f2bcbe5326f3

  • SSDEEP

    49152:evkt62XlaSFNWPjljiFa2RoUYIbHRJ6hbR3LoGduKTHHB72eh2NT:ev462XlaSFNWPjljiFXRoUYIbHRJ6D

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.50.244:4782

Mutex

8c0dd4a8-9378-4bb0-a8b0-01c7a7abc4a0

Attributes
  • encryption_key

    25C9945CAA6B7DC1F00936AF44864E2B40484EAE

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      a5aa53a0c804e4ca657a4f27cd1c02c0_NeikiAnalytics.exe

    • Size

      3.1MB

    • MD5

      a5aa53a0c804e4ca657a4f27cd1c02c0

    • SHA1

      0ee279c8084ef985c4525b5d2f494c28c5795e8e

    • SHA256

      a0b392d3c49dc9b3b763b6ad04984877f6ab7652a09630faa5b7058a19c81a5f

    • SHA512

      cf59cb9797901a7a2cf447d2bb468996728a8c135e40978c545696e076f82b3faeae47681afb05498df856042d253cc16800d1dba57f89594428f2bcbe5326f3

    • SSDEEP

      49152:evkt62XlaSFNWPjljiFa2RoUYIbHRJ6hbR3LoGduKTHHB72eh2NT:ev462XlaSFNWPjljiFXRoUYIbHRJ6D

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks