General

  • Target

    https://github.com/areinto/Synapse-X-Byfron-Bypass

  • Sample

    240602-wa2v7aaf95

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

SynapseX

C2

espiny-38468.portmap.host:38468

Mutex

987e6177-8b62-48ea-8ca9-c699971b74ba

Attributes
  • encryption_key

    C7EC88A5CCB59BD73EF3F7D4787818BE89C06664

  • install_name

    Boot 10.5.exe

  • log_directory

    Windows Logs

  • reconnect_delay

    3000

  • startup_key

    Windows 10 Boot

  • subdirectory

    Windows 10 Boot

Targets

    • Target

      https://github.com/areinto/Synapse-X-Byfron-Bypass

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Remote System Discovery

1
T1018

Tasks