General

  • Target

    37fa30c9dcf255bda62c0a6b7f88a48263a3da18d18d8c66b1cbbc801077cfdf.exe

  • Size

    503KB

  • Sample

    240611-bjlv4syelk

  • MD5

    a760c4263a2d1e144c2fd116bf1351e1

  • SHA1

    98da7637a98df832078ed0ec08d11d588223783e

  • SHA256

    37fa30c9dcf255bda62c0a6b7f88a48263a3da18d18d8c66b1cbbc801077cfdf

  • SHA512

    ee8ff2686a4a95a779711ca3126423f769351de6b9e8a27d0ff0d78212e76ef703ada91778620799dd3dbe07cea840f7f44c65273278ea3b4f539274dbc806bf

  • SSDEEP

    12288:+TEgdfY97axTU7H4TywQCngRnLN9cHcdA:bUwkyoywQCnkgcdA

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

BEOBEO

C2

222.253.182.185:9090

Mutex

b629c3f9-6e84-4b12-aa44-142bd48d26fe

Attributes
  • encryption_key

    E3F9325FDCF7CBE474DB678812431E432D3171B2

  • install_name

    Realtek HD Audio Universal Services.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Realtek

  • subdirectory

    Realtek HD Audio Universal Services

Targets

    • Target

      37fa30c9dcf255bda62c0a6b7f88a48263a3da18d18d8c66b1cbbc801077cfdf.exe

    • Size

      503KB

    • MD5

      a760c4263a2d1e144c2fd116bf1351e1

    • SHA1

      98da7637a98df832078ed0ec08d11d588223783e

    • SHA256

      37fa30c9dcf255bda62c0a6b7f88a48263a3da18d18d8c66b1cbbc801077cfdf

    • SHA512

      ee8ff2686a4a95a779711ca3126423f769351de6b9e8a27d0ff0d78212e76ef703ada91778620799dd3dbe07cea840f7f44c65273278ea3b4f539274dbc806bf

    • SSDEEP

      12288:+TEgdfY97axTU7H4TywQCngRnLN9cHcdA:bUwkyoywQCnkgcdA

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects executables containing common artifacts observed in infostealers

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

Tasks