General

  • Target

    https://github.com/discord1ggWUFGKADF/Celex/blob/main/Zen9andCelex.exe

  • Sample

    240520-xe7snsdc4t

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Opera

C2

192.168.2.115:1162

Mutex

38ed98b5-964f-4a70-a34b-b5a280e2a008

Attributes
  • encryption_key

    7A857EF3A3EB39AF399F1F3800FB9F842DC83C9E

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    1

  • startup_key

    MicrosoftUpdate

  • subdirectory

    SubDir

Targets

    • Target

      https://github.com/discord1ggWUFGKADF/Celex/blob/main/Zen9andCelex.exe

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

3
T1082

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

Command and Control

Web Service

1
T1102

Tasks