General

  • Target

    python-3.12.3-amd64_protected.exe

  • Size

    8.6MB

  • Sample

    240519-zr7dsahf8w

  • MD5

    328626049b23e7d5fbe12f9503853d53

  • SHA1

    402ca69107944196f421a16ce3be363a0f4e991c

  • SHA256

    96eb67eaf4d600885d149701f7b720f004a1646775a179e77e8706762405e921

  • SHA512

    5425ef358018a66977e711bfa2a794c725bd153df5989cae52419115c981ce94cc15b6ae826c42d786aa3363151d9c051ae53407ab5e07fcc7365ef054b03c91

  • SSDEEP

    196608:VGjSZs4BJq1Ey1FJrMwM/RAWOY+3uWjNyWte7c:VXZsI0F5MYYjWjM7c

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Python

C2

5.39.43.50:1488

Mutex

393fbc9d-531f-4025-b3f0-bed4d56f6ed3

Attributes
  • encryption_key

    1E01F0D74E189002EDB2FABC8EC064751C9D7A63

  • install_name

    Python.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Python3

  • subdirectory

    Python3

Targets

    • Target

      python-3.12.3-amd64_protected.exe

    • Size

      8.6MB

    • MD5

      328626049b23e7d5fbe12f9503853d53

    • SHA1

      402ca69107944196f421a16ce3be363a0f4e991c

    • SHA256

      96eb67eaf4d600885d149701f7b720f004a1646775a179e77e8706762405e921

    • SHA512

      5425ef358018a66977e711bfa2a794c725bd153df5989cae52419115c981ce94cc15b6ae826c42d786aa3363151d9c051ae53407ab5e07fcc7365ef054b03c91

    • SSDEEP

      196608:VGjSZs4BJq1Ey1FJrMwM/RAWOY+3uWjNyWte7c:VXZsI0F5MYYjWjM7c

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks