General

  • Target

    ec5fa919b523ea3effb48a867b496d30a3bbf2208bc5652f812ebd0d87889ad0

  • Size

    4.8MB

  • Sample

    240531-fb9dnafd5x

  • MD5

    a7162b6eabcdb753b8ec85bda90af43c

  • SHA1

    e837aa3e994604f84c3adb4f6a10dc602e326a3e

  • SHA256

    ec5fa919b523ea3effb48a867b496d30a3bbf2208bc5652f812ebd0d87889ad0

  • SHA512

    3aeb0173d2169d9607a9e9e12c6ded9a2e0ab68b3c522ef287d3d5245b8c9eceec903685e30698711678664c6e002f09c224b61eaadd0cd54e1646104da8a4e4

  • SSDEEP

    98304:seblXFo9C2j9+slcz8nUN6aaVFS0yi8hjOkWHCDwfIH7gDEgpzx:jZXFiCzsqz8JVFw/mHUwIMoCz

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

dilly

C2

lvke-45989.portmap.host:45989

Mutex

0cb49dc2-fd0d-4581-ae1e-04154c41f310

Attributes
  • encryption_key

    E5250226804167CB0B1B4B0E9667D0C056694DCA

  • install_name

    defenderx64.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Defender Helper

  • subdirectory

    en

Targets

    • Target

      ec5fa919b523ea3effb48a867b496d30a3bbf2208bc5652f812ebd0d87889ad0

    • Size

      4.8MB

    • MD5

      a7162b6eabcdb753b8ec85bda90af43c

    • SHA1

      e837aa3e994604f84c3adb4f6a10dc602e326a3e

    • SHA256

      ec5fa919b523ea3effb48a867b496d30a3bbf2208bc5652f812ebd0d87889ad0

    • SHA512

      3aeb0173d2169d9607a9e9e12c6ded9a2e0ab68b3c522ef287d3d5245b8c9eceec903685e30698711678664c6e002f09c224b61eaadd0cd54e1646104da8a4e4

    • SSDEEP

      98304:seblXFo9C2j9+slcz8nUN6aaVFS0yi8hjOkWHCDwfIH7gDEgpzx:jZXFiCzsqz8JVFw/mHUwIMoCz

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables containing common artifacts observed in infostealers

    • Detects executables packed with Themida

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Tasks