General

  • Target

    6333b624e660914372affcb1c1018727a6af72e3f4cbf572e40f7f91596db233

  • Size

    11KB

  • Sample

    240517-wnr8xabg96

  • MD5

    704a84956ccaafdf044a5aed5e02d7f6

  • SHA1

    31e4f4591084991d0e1b56a8edb04c9c12c47f8d

  • SHA256

    6333b624e660914372affcb1c1018727a6af72e3f4cbf572e40f7f91596db233

  • SHA512

    c913e2358405d9fd089de4fcfca0b0784c5c5768c6dd790354bde0f2dabf191bdf8e0d98df7ac94ceb3075c2e94595b1bcb5479e45601df5b83129ca05c1bbdf

  • SSDEEP

    192:yj6Zyx2ZDJ5xwdGO2zpKetQZz5ZLbrYWL39mxWpQVLSLrLF+3g8NaVe+fuSEZT:C6Zyx2ZDJ5xwdGO2zpKet+dZLtLNmxWk

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.1.227:4782

Mutex

f3d13830-043f-4b71-9ea6-e9606fbe9c47

Attributes
  • encryption_key

    E5250226804167CB0B1B4B0E9667D0C056694DCA

  • install_name

    defenderx64.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Defender Helper

  • subdirectory

    Windows Defender

Targets

    • Target

      6333b624e660914372affcb1c1018727a6af72e3f4cbf572e40f7f91596db233

    • Size

      11KB

    • MD5

      704a84956ccaafdf044a5aed5e02d7f6

    • SHA1

      31e4f4591084991d0e1b56a8edb04c9c12c47f8d

    • SHA256

      6333b624e660914372affcb1c1018727a6af72e3f4cbf572e40f7f91596db233

    • SHA512

      c913e2358405d9fd089de4fcfca0b0784c5c5768c6dd790354bde0f2dabf191bdf8e0d98df7ac94ceb3075c2e94595b1bcb5479e45601df5b83129ca05c1bbdf

    • SSDEEP

      192:yj6Zyx2ZDJ5xwdGO2zpKetQZz5ZLbrYWL39mxWpQVLSLrLF+3g8NaVe+fuSEZT:C6Zyx2ZDJ5xwdGO2zpKet+dZLtLNmxWk

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks