General

  • Target

    Client-built.exe

  • Size

    3.1MB

  • Sample

    240617-w5m1hsyhmb

  • MD5

    8d79d6ba302c95e336bb86cc9a3fe020

  • SHA1

    f3c08150c3bbf78f6975a419897fcc095a07c978

  • SHA256

    f4cb4e229bd182706b5a3a1bd216752acfb0f6ff4085efeb2a405ada19be03ce

  • SHA512

    f1df94fa6ffbe85868dc60f64368550936431147d5f4ba3ed1bb52966cd466d4cfe7757f025ecf74851836e8d2db01bf14a2af38f56e17ec36fd4f7beaa740f5

  • SSDEEP

    49152:XvOlL26AaNeWgPhlmVqvMQ7XSKU3jwdO478wMXp5oGMm1mTHHB72eh2NT:Xv+L26AaNeWgPhlmVqkQ7XSKU3jwdM

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Eyewalled

C2

147.185.221.18:18043

147.185.221.18:1358

Mutex

348940a4-40db-4d79-9103-0f7d01523a5f

Attributes
  • encryption_key

    EFBE3AE92C7EEEEF56234B89DE1D5E6E1E66581C

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3001

  • startup_key

    Quasar Client Startup

  • subdirectory

    Management

Targets

    • Target

      Client-built.exe

    • Size

      3.1MB

    • MD5

      8d79d6ba302c95e336bb86cc9a3fe020

    • SHA1

      f3c08150c3bbf78f6975a419897fcc095a07c978

    • SHA256

      f4cb4e229bd182706b5a3a1bd216752acfb0f6ff4085efeb2a405ada19be03ce

    • SHA512

      f1df94fa6ffbe85868dc60f64368550936431147d5f4ba3ed1bb52966cd466d4cfe7757f025ecf74851836e8d2db01bf14a2af38f56e17ec36fd4f7beaa740f5

    • SSDEEP

      49152:XvOlL26AaNeWgPhlmVqvMQ7XSKU3jwdO478wMXp5oGMm1mTHHB72eh2NT:Xv+L26AaNeWgPhlmVqkQ7XSKU3jwdM

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

1
T1552.001

Credentials in Registry

1
T1552.002

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Tasks