General

  • Target

    799d6cb505b54bcfb7dcba07cb406fe8_JaffaCakes118

  • Size

    348KB

  • Sample

    240527-s567lsac84

  • MD5

    799d6cb505b54bcfb7dcba07cb406fe8

  • SHA1

    8563608d5cc6e52dd2834a295b08c4108fe709be

  • SHA256

    b626158fdbfaa911fefd862b9e6caeb47cdaf53954a9d6ba66cd895542c369b0

  • SHA512

    b5497a65e5ad4ea75305cb718573bb2f2d0d1e1b186f454a4cdf8cb6a0b624fcd797fd4d0b2bf1d36dc6f17e983fa1bab0de563e567f90bf3f067cbb75e1c372

  • SSDEEP

    6144:ZzNHXf500MYHAM9PPEnqH7bfYbFD7eBcADO+:Fd50HMtxQFD7eOAC+

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Office04

C2

68.94.252.162:4782

Mutex

QSR_MUTEX_j3gNc0L0ssBc0mCO5F

Attributes
  • encryption_key

    XfsQ76jccqZq9jzXbmz8

  • install_name

    Rift S Patch Tool.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Win64x

  • subdirectory

    SubDir

Targets

    • Target

      799d6cb505b54bcfb7dcba07cb406fe8_JaffaCakes118

    • Size

      348KB

    • MD5

      799d6cb505b54bcfb7dcba07cb406fe8

    • SHA1

      8563608d5cc6e52dd2834a295b08c4108fe709be

    • SHA256

      b626158fdbfaa911fefd862b9e6caeb47cdaf53954a9d6ba66cd895542c369b0

    • SHA512

      b5497a65e5ad4ea75305cb718573bb2f2d0d1e1b186f454a4cdf8cb6a0b624fcd797fd4d0b2bf1d36dc6f17e983fa1bab0de563e567f90bf3f067cbb75e1c372

    • SSDEEP

      6144:ZzNHXf500MYHAM9PPEnqH7bfYbFD7eBcADO+:Fd50HMtxQFD7eOAC+

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Tasks