General

  • Target

    Beta.exe

  • Size

    3.1MB

  • Sample

    240530-p8bnbsae68

  • MD5

    bb26a2979d9a61725f910422403ed4dd

  • SHA1

    b46d4a3a7f7253e1d7268c060702d301ebb36dd6

  • SHA256

    fb80d28a129184b6a273bd893aeee80765b6ec3eb617d90c6d32d0738bcbbfef

  • SHA512

    dfa1d068282cae728f6adf890065c0dcecbf9215646f50313d995afd209f52c07f3fd8e1e414c8712af1e2b5306ef453a9b6419f1c574dbd445acbc276426200

  • SSDEEP

    49152:ivEt62XlaSFNWPjljiFa2RoUYI9ihqKhHvJQMoGd9THHB72eh2NT:ivY62XlaSFNWPjljiFXRoUYImh5

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Astro-1

C2

arthurus36.duckdns.org:5555

Mutex

ad7cd985-5e2e-45a3-9246-b82449c7c4d8

Attributes
  • encryption_key

    6314C8C60AA1035CEB920FD38F0342E398BAF5D0

  • install_name

    cmdprmpt.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    systemdex

Targets

    • Target

      Beta.exe

    • Size

      3.1MB

    • MD5

      bb26a2979d9a61725f910422403ed4dd

    • SHA1

      b46d4a3a7f7253e1d7268c060702d301ebb36dd6

    • SHA256

      fb80d28a129184b6a273bd893aeee80765b6ec3eb617d90c6d32d0738bcbbfef

    • SHA512

      dfa1d068282cae728f6adf890065c0dcecbf9215646f50313d995afd209f52c07f3fd8e1e414c8712af1e2b5306ef453a9b6419f1c574dbd445acbc276426200

    • SSDEEP

      49152:ivEt62XlaSFNWPjljiFa2RoUYI9ihqKhHvJQMoGd9THHB72eh2NT:ivY62XlaSFNWPjljiFXRoUYImh5

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks