General

  • Target

    a76ef5638e61804d10d31e8ed1c84343_JaffaCakes118

  • Size

    348KB

  • Sample

    240614-bcd7pasdnp

  • MD5

    a76ef5638e61804d10d31e8ed1c84343

  • SHA1

    32039dc29cf63a139d515938b27e9a31bfc5f9d6

  • SHA256

    03cc80e703f15fdbb3db1c0ef001bf9d89c9cfd112d98839734b49830ab4b17a

  • SHA512

    626491f951c3c35da39241338334a18091786f96ca062bac16addb6b7142365c04e6dd613a2109e537e4dd77841b9cdcab75347b16b55e9a88ceb2e79f58c0b9

  • SSDEEP

    6144:c2SiPqU23zkV485UloNJpPb+pwL1sKzqJ4cDe:zoU2meQWwhlzC4cDe

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

deafult

C2

192.168.0.105:4782

84.43.208.174:4782

127.0.0.1:4782

Mutex

QSR_MUTEX_UaiJzl9ZgZ3DO0L3Ch

Attributes
  • encryption_key

    D69vVSh4aQLaRQFw7JAa

  • install_name

    Skypu.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    app

  • subdirectory

    Skypa

Targets

    • Target

      a76ef5638e61804d10d31e8ed1c84343_JaffaCakes118

    • Size

      348KB

    • MD5

      a76ef5638e61804d10d31e8ed1c84343

    • SHA1

      32039dc29cf63a139d515938b27e9a31bfc5f9d6

    • SHA256

      03cc80e703f15fdbb3db1c0ef001bf9d89c9cfd112d98839734b49830ab4b17a

    • SHA512

      626491f951c3c35da39241338334a18091786f96ca062bac16addb6b7142365c04e6dd613a2109e537e4dd77841b9cdcab75347b16b55e9a88ceb2e79f58c0b9

    • SSDEEP

      6144:c2SiPqU23zkV485UloNJpPb+pwL1sKzqJ4cDe:zoU2meQWwhlzC4cDe

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Tasks