General

  • Target

    file.ps1

  • Size

    5KB

  • Sample

    240613-fl7b2syejr

  • MD5

    4423e1ca4a31c0d57ca4c3f6c8c90b71

  • SHA1

    2391ec187dff5771c8580c8e2ff3a3ef8aebdf62

  • SHA256

    5fb6f4eb5a18cae3792438f5e919efb46a46fffbdf18986f52b425c8b5983b55

  • SHA512

    c4f86652d4525b5412f4063f412b9486ffe411a1bdf33efae82f2544f8da92260c4666a2b85ca8ed55bbf71270d1f9ddd66008aa3db317c47958dd56c3bce759

  • SSDEEP

    96:Wy9RoMdK9QDoiIcnG+BUy0Y5nO+GKTZ3enFOoS+4grynmXVRhXaBk:7kWi9Ef5nOpKtkO5sQmABk

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Boris FX Sapphire

C2

craftmoold.ddnsguru.com:1983

Mutex

VspDxC4KY6UH5ES3Xw

Attributes
  • encryption_key

    X8GClSeDI9aurtbGirOt

  • install_name

    Client.exe

  • log_directory

    16HD

  • reconnect_delay

    6000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      file.ps1

    • Size

      5KB

    • MD5

      4423e1ca4a31c0d57ca4c3f6c8c90b71

    • SHA1

      2391ec187dff5771c8580c8e2ff3a3ef8aebdf62

    • SHA256

      5fb6f4eb5a18cae3792438f5e919efb46a46fffbdf18986f52b425c8b5983b55

    • SHA512

      c4f86652d4525b5412f4063f412b9486ffe411a1bdf33efae82f2544f8da92260c4666a2b85ca8ed55bbf71270d1f9ddd66008aa3db317c47958dd56c3bce759

    • SSDEEP

      96:Wy9RoMdK9QDoiIcnG+BUy0Y5nO+GKTZ3enFOoS+4grynmXVRhXaBk:7kWi9Ef5nOpKtkO5sQmABk

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Tasks