General

  • Target

    0c9d62335c53a76df0bdec0bc243d5b0_NeikiAnalytics.exe

  • Size

    3.1MB

  • Sample

    240527-ll38aafc7x

  • MD5

    0c9d62335c53a76df0bdec0bc243d5b0

  • SHA1

    691c9d535f8942a9489e0baae271463443a5d298

  • SHA256

    65bd56cfb876a9f4399e311f253ed83d45f7fed896eeba9f9c2dc7b6eb26d3f2

  • SHA512

    4376bfe437defbf0e350b7220c7995a16cf0161881500f0ba7faae371afe5f4aef71858231d8f7b201381ff1c6c06adc132a72db578980019281536112c3b1c8

  • SSDEEP

    49152:SvWI22SsaNYfdPBldt698dBcjHduRJ6KbR3LoGdfTHHB72eh2NT:Sv722SsaNYfdPBldt6+dBcjHduRJ6k

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

26.27.32.75:4782

Mutex

0cfc6260-9d2e-4af5-9d5c-36502e10581d

Attributes
  • encryption_key

    812D564FEDCE5BAF795823ACE48DC125C79FF0F6

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      0c9d62335c53a76df0bdec0bc243d5b0_NeikiAnalytics.exe

    • Size

      3.1MB

    • MD5

      0c9d62335c53a76df0bdec0bc243d5b0

    • SHA1

      691c9d535f8942a9489e0baae271463443a5d298

    • SHA256

      65bd56cfb876a9f4399e311f253ed83d45f7fed896eeba9f9c2dc7b6eb26d3f2

    • SHA512

      4376bfe437defbf0e350b7220c7995a16cf0161881500f0ba7faae371afe5f4aef71858231d8f7b201381ff1c6c06adc132a72db578980019281536112c3b1c8

    • SSDEEP

      49152:SvWI22SsaNYfdPBldt698dBcjHduRJ6KbR3LoGdfTHHB72eh2NT:Sv722SsaNYfdPBldt6+dBcjHduRJ6k

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

Tasks