Analysis

  • max time kernel
    32s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-06-2024 17:32

General

  • Target

    Loli_Niggerrr.exe

  • Size

    21.4MB

  • MD5

    dc4dbf206e4ba17cc40c879706ebbf64

  • SHA1

    adc35bfd111d600d59b6a76787d9594e89973a03

  • SHA256

    8887b29a171153362b3dbb478801e087ca53ac8960cb06b44e791ecc4c4eaa4d

  • SHA512

    79df05d1e0572d387c70f835432193399389042142f964b865f8f4f7de06cfeaf3e1952d45beb9ea8621e64e17658557f0f1914f7b991d98e8d9efc5365e4256

  • SSDEEP

    98304:B1slPHmk2Ynhn+gX9uV2CQzS0y/3ibkabFbp1A11eFt4I/p/:gPHmkTPXgVLYs/3iFbFbp6XsB/

Malware Config

Extracted

Family

quasar

Attributes
  • encryption_key

    E2FB9900B23756E2DDF30B24E44B0961BA7B0F9C

  • reconnect_delay

    3000

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loli_Niggerrr.exe
    "C:\Users\Admin\AppData\Local\Temp\Loli_Niggerrr.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2780

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2780-0-0x00007FF869CC3000-0x00007FF869CC5000-memory.dmp
    Filesize

    8KB

  • memory/2780-1-0x0000000000FA0000-0x0000000002518000-memory.dmp
    Filesize

    21.5MB

  • memory/2780-2-0x00007FF869CC0000-0x00007FF86A781000-memory.dmp
    Filesize

    10.8MB

  • memory/2780-3-0x0000000004860000-0x0000000004861000-memory.dmp
    Filesize

    4KB

  • memory/2780-4-0x00007FF869CC0000-0x00007FF86A781000-memory.dmp
    Filesize

    10.8MB

  • memory/2780-5-0x00007FF869CC0000-0x00007FF86A781000-memory.dmp
    Filesize

    10.8MB

  • memory/2780-6-0x00007FF869CC0000-0x00007FF86A781000-memory.dmp
    Filesize

    10.8MB

  • memory/2780-8-0x00007FF869CC0000-0x00007FF86A781000-memory.dmp
    Filesize

    10.8MB