General
-
Target
BRUH_QUASAR.exe
-
Size
3.1MB
-
Sample
240601-we3naaah32
-
MD5
24a82c21233460c9796a86c7857a2adf
-
SHA1
88017202e84f8d0174caa451bbebd64401ae8032
-
SHA256
57e13460fbe54a3cc57d9abfaf6ef9a9c3c2d804230e4df7d8f97408501e7dfa
-
SHA512
32aa12d6dfe90c7dbe2c8f82d60d92e649d381b365c7cc7493526693257d5f859ea8ae5b8b6424193f5465aac76bf210415949ea7b18965644b01f27f38f47a1
-
SSDEEP
98304:ifNEOWyKYuMQ+xuMiTMBzOKYLSmPX1qadpu4IdXeYbsjeveyYHHY8evKe5Xfc9Oe:AfNuMiTNKYmmPX1qadpu4IdXeYbsjevK
Behavioral task
behavioral1
Sample
BRUH_QUASAR.exe
Resource
win11-20240426-en
Malware Config
Extracted
quasar
1.4.1
$OXY
193.34.77.154:4782
fc050dca-72e2-474b-873c-c6835aec5c39
-
encryption_key
7F75A06DDBDADB13C7843DF2026145379D75E4DA
-
install_name
$OXY_EXE.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
$OXY_START
-
subdirectory
$OXY_SUB
Extracted
remcos
$OXY
193.34.77.154:9872
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
2
-
copy_file
$OXY.exe
-
copy_folder
$OXY
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
true
-
install_path
%WinDir%\System32
-
keylog_crypt
true
-
keylog_file
$OXYlogs.dat
-
keylog_flag
false
-
keylog_folder
$OXY
-
keylog_path
%WinDir%\System32
-
mouse_option
false
-
mutex
$OXY-6JA1WZ
-
screenshot_crypt
true
-
screenshot_flag
true
-
screenshot_folder
$OXY_Screenshots
-
screenshot_path
%WinDir%\System32
-
screenshot_time
120
-
startup_value
$OXY
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
BRUH_QUASAR.exe
-
Size
3.1MB
-
MD5
24a82c21233460c9796a86c7857a2adf
-
SHA1
88017202e84f8d0174caa451bbebd64401ae8032
-
SHA256
57e13460fbe54a3cc57d9abfaf6ef9a9c3c2d804230e4df7d8f97408501e7dfa
-
SHA512
32aa12d6dfe90c7dbe2c8f82d60d92e649d381b365c7cc7493526693257d5f859ea8ae5b8b6424193f5465aac76bf210415949ea7b18965644b01f27f38f47a1
-
SSDEEP
98304:ifNEOWyKYuMQ+xuMiTMBzOKYLSmPX1qadpu4IdXeYbsjeveyYHHY8evKe5Xfc9Oe:AfNuMiTNKYmmPX1qadpu4IdXeYbsjevK
-
Quasar payload
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1