General

  • Target

    Dishkum Tena.exe

  • Size

    3.1MB

  • Sample

    240603-jd29xagb6w

  • MD5

    36970784c3736c71546d73e0773ee956

  • SHA1

    2d09c257a3e09b079d23520400953bafc495e06e

  • SHA256

    55d9f08bfa42b14a3bbb968df3b645e18ea4c311656c272c1b9522aa648f955d

  • SHA512

    6f0fd26eb7f2b64c875f7021f82ddf8240beaba804a6649404ac8e33115d1372dc53cae94e242b1a77a4bf86f4836bc072b9e64563204b591d03357d3c82be2c

  • SSDEEP

    49152:Gvht62XlaSFNWPjljiFa2RoUYI1C91JgLoGd9hTHHB72eh2NT:GvL62XlaSFNWPjljiFXRoUYI1CE

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Dani69

C2

192.168.1.2:4782

Mutex

9f26ad88-50ee-4f62-81ff-c770a798a67c

Attributes
  • encryption_key

    81B07382BFEB227CBA1AE8701042E7A26708E9ED

  • install_name

    Dani69.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Dani69

  • subdirectory

    SubDir

Targets

    • Target

      Dishkum Tena.exe

    • Size

      3.1MB

    • MD5

      36970784c3736c71546d73e0773ee956

    • SHA1

      2d09c257a3e09b079d23520400953bafc495e06e

    • SHA256

      55d9f08bfa42b14a3bbb968df3b645e18ea4c311656c272c1b9522aa648f955d

    • SHA512

      6f0fd26eb7f2b64c875f7021f82ddf8240beaba804a6649404ac8e33115d1372dc53cae94e242b1a77a4bf86f4836bc072b9e64563204b591d03357d3c82be2c

    • SSDEEP

      49152:Gvht62XlaSFNWPjljiFa2RoUYI1C91JgLoGd9hTHHB72eh2NT:GvL62XlaSFNWPjljiFXRoUYI1CE

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

2
T1082

Query Registry

2
T1012

Tasks