General
-
Target
eCEDOE
-
Size
518B
-
Sample
240531-xn2b9ahf51
-
MD5
4d1663a0ae7ea388d58585f604fb83cd
-
SHA1
d5e81bc6f4913c2ccc586f573806f79833e5bf62
-
SHA256
8ff6a899594731102074028794a8fab31d38857a976a0bb90b341f7f8b8554cb
-
SHA512
a0373a4571e290123a321368c899799ddde5ecc29cf6f7863b045cde580d8390852cfec292879fa65a15f5d7a971c1bd72b43da568d15ebb4286cac4c6455663
Static task
static1
Behavioral task
behavioral1
Sample
eCEDOE.html
Resource
win11-20240426-en
Malware Config
Extracted
quasar
1.4.1
Office04
37.19.205.146:4782
107.203.232.8:80
107.203.232.8:3012
77.111.246.47:3012
76.11.167.128:3012
1cd14fab-fbed-4b3d-a27d-f64eca81a694
-
encryption_key
C401F5E4B21F440F2783CBEC4404C9124B18FE39
-
install_name
SASRP Token Logger.exe
-
log_directory
Logs
-
reconnect_delay
2998
-
startup_key
SASRP | CIA RAT
-
subdirectory
SASRP_Token_Logger
Targets
-
-
Target
eCEDOE
-
Size
518B
-
MD5
4d1663a0ae7ea388d58585f604fb83cd
-
SHA1
d5e81bc6f4913c2ccc586f573806f79833e5bf62
-
SHA256
8ff6a899594731102074028794a8fab31d38857a976a0bb90b341f7f8b8554cb
-
SHA512
a0373a4571e290123a321368c899799ddde5ecc29cf6f7863b045cde580d8390852cfec292879fa65a15f5d7a971c1bd72b43da568d15ebb4286cac4c6455663
Score10/10-
Quasar payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1