Malware Analysis Report

2024-08-06 11:11

Sample ID 240614-gyvdpaxhna
Target Client.exe
SHA256 33a0d3e73c72239b279e4e7d87fadcbf7da3389c18d0f905e0fa135295d8b715
Tags
quasar spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

33a0d3e73c72239b279e4e7d87fadcbf7da3389c18d0f905e0fa135295d8b715

Threat Level: Known bad

The file Client.exe was found to be: Known bad.

Malicious Activity Summary

quasar spyware trojan

Quasar family

Quasar payload

Quasar RAT

Unsigned PE

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-14 06:13

Signatures

Quasar family

quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 06:13

Reported

2024-06-14 06:33

Platform

win10-20240404-en

Max time kernel

315s

Max time network

887s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Client.exe"

Signatures

Quasar RAT

trojan spyware quasar

Quasar payload

Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Client.exe

"C:\Users\Admin\AppData\Local\Temp\Client.exe"

Network

Country Destination Domain Proto
US 52.111.227.14:443 tcp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 137.71.105.51.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp

Files

memory/1580-0-0x00007FFDB61E3000-0x00007FFDB61E4000-memory.dmp

memory/1580-1-0x0000000000050000-0x000000000037A000-memory.dmp

memory/1580-3-0x00007FFDB61E0000-0x00007FFDB6BCC000-memory.dmp

memory/1580-4-0x00007FFDB61E0000-0x00007FFDB6BCC000-memory.dmp