General

  • Target

    WaveCracked.exe

  • Size

    17.8MB

  • Sample

    240717-p8zeds1hqk

  • MD5

    befc855906a931a247dac42f51f94dcc

  • SHA1

    d0c611c614a9697b10c6f58c9dc91c0e12670b25

  • SHA256

    2924eb7ce3f424a385b71823017af1b572fe19e8c91fdf1be26a712891f57a74

  • SHA512

    cdcdb109e2170ea4d878e8080a3227efe3c1e658226740f82c11c0e2a8df97328d31f1293b3ab8568af91fd39ea2fbe283fbe41d8875d8ef4ac5d051cb77168b

  • SSDEEP

    393216:E7TliC76u0Mz6VzVgqd5kTiy9o9KNHkzMmsW0W3WWRqusbMGCNFxHWN:YiC76u0M6VGqcTiChWAjBZMGyF2

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Steam

C2

20.ip.gl.ply.gg:55257

Mutex

15d4edb7-40c0-4a95-9dc8-8fe93071bce0

Attributes
  • encryption_key

    F1B995FFCFBEAA3218870A13F82413DC65D82218

  • install_name

    Steam.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    SteamClient

  • subdirectory

    %appdata%

Targets

    • Target

      WaveCracked.exe

    • Size

      17.8MB

    • MD5

      befc855906a931a247dac42f51f94dcc

    • SHA1

      d0c611c614a9697b10c6f58c9dc91c0e12670b25

    • SHA256

      2924eb7ce3f424a385b71823017af1b572fe19e8c91fdf1be26a712891f57a74

    • SHA512

      cdcdb109e2170ea4d878e8080a3227efe3c1e658226740f82c11c0e2a8df97328d31f1293b3ab8568af91fd39ea2fbe283fbe41d8875d8ef4ac5d051cb77168b

    • SSDEEP

      393216:E7TliC76u0Mz6VzVgqd5kTiy9o9KNHkzMmsW0W3WWRqusbMGCNFxHWN:YiC76u0M6VGqcTiChWAjBZMGyF2

    • Detect Umbral payload

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks