Resubmissions

29-05-2024 04:02

240529-el419aaf63 10

29-05-2024 03:57

240529-eh157aae65 10

General

  • Target

    Client-built.exe

  • Size

    3.1MB

  • Sample

    240529-el419aaf63

  • MD5

    edd373e0c5b33b63857417fe30229b22

  • SHA1

    fd1834882a6c411b97a51f2e1ddb57058465fdc3

  • SHA256

    9b906e8b6e09cdb3ad9d100dcb77df6f30e0a88c1fb164ea491a9e6fdd823083

  • SHA512

    80ffb0dfe71ca3bc6e7b414d2ba8924a99e481e36aadbc9a176571d121556637fa50621509886030959dd48e6419d0fe4f3c20ce56a304912c5259d8fd0dd9d5

  • SSDEEP

    49152:+vSI22SsaNYfdPBldt698dBcjHdExk1v4LoG+8GQ0THHB72eh2NT:+v/22SsaNYfdPBldt6+dBcjHdExnG

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

10.0.0.5:55976

127.0.0.1:12995

Mutex

fd7766f9-01b8-4f7d-9510-71226643b102

Attributes
  • encryption_key

    1A0BB6F7E6C51A39D122080A266E59E4C6D10FA8

  • install_name

    Centixwareinstaller.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows 11 Dir

  • subdirectory

    SubDir

Targets

    • Target

      Client-built.exe

    • Size

      3.1MB

    • MD5

      edd373e0c5b33b63857417fe30229b22

    • SHA1

      fd1834882a6c411b97a51f2e1ddb57058465fdc3

    • SHA256

      9b906e8b6e09cdb3ad9d100dcb77df6f30e0a88c1fb164ea491a9e6fdd823083

    • SHA512

      80ffb0dfe71ca3bc6e7b414d2ba8924a99e481e36aadbc9a176571d121556637fa50621509886030959dd48e6419d0fe4f3c20ce56a304912c5259d8fd0dd9d5

    • SSDEEP

      49152:+vSI22SsaNYfdPBldt698dBcjHdExk1v4LoG+8GQ0THHB72eh2NT:+v/22SsaNYfdPBldt6+dBcjHdExnG

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

Tasks