General

  • Target

    SiHost.exe

  • Size

    348KB

  • Sample

    240614-wsajna1dqh

  • MD5

    c6250d3d376c1956627bf8f4f827bbd6

  • SHA1

    7444e248bc182e849556cfa3c2519e30ae8ee82f

  • SHA256

    9b87f3813641da8be21f130cdd5cb52c2f8ae5494a408d2303f9770b7f3039d8

  • SHA512

    8de084cac0e01c8d5b1c8e5443ef97a1412bb4b7ed41d1e4c5e1b5e40750b0bb6d06c9a3b16e325ca8bbe260397ee130560d0d699ff302f2ef5f8196231fa44e

  • SSDEEP

    6144:ON13U1vhtvTA1B3jZwIbmXtNx47cSm3Bs3:iUJtLAX3jMXtNyw3Bs3

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Farrag

C2

17.ip.gl.ply.gg:33386

Mutex

QSR_MUTEX_4Q6TQpIEBpG4GGALTz

Attributes
  • encryption_key

    qZ74sJrr75km6SoIX0sF

  • install_name

    SiHost.exe

  • log_directory

    SiHost

  • reconnect_delay

    3000

  • startup_key

    SiHost

  • subdirectory

    SiHost

Targets

    • Target

      SiHost.exe

    • Size

      348KB

    • MD5

      c6250d3d376c1956627bf8f4f827bbd6

    • SHA1

      7444e248bc182e849556cfa3c2519e30ae8ee82f

    • SHA256

      9b87f3813641da8be21f130cdd5cb52c2f8ae5494a408d2303f9770b7f3039d8

    • SHA512

      8de084cac0e01c8d5b1c8e5443ef97a1412bb4b7ed41d1e4c5e1b5e40750b0bb6d06c9a3b16e325ca8bbe260397ee130560d0d699ff302f2ef5f8196231fa44e

    • SSDEEP

      6144:ON13U1vhtvTA1B3jZwIbmXtNx47cSm3Bs3:iUJtLAX3jMXtNyw3Bs3

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks