General
-
Target
734a651df8e337d0ce287b737eda1ba09e11b3ac00b7aa00c0b4ff66b67a8f40
-
Size
4.1MB
-
Sample
240806-bgrctavanq
-
MD5
c1d4a5533effd830b2511e3d36126dbf
-
SHA1
d67fdc24d7602e6c8b1a5bdbb46fe1bfeee8ec25
-
SHA256
734a651df8e337d0ce287b737eda1ba09e11b3ac00b7aa00c0b4ff66b67a8f40
-
SHA512
1495e65c0048d9addeba488cb522854d0c1f60e74911cc7b0a356524b8c423f6225b320392bdfb7e6ad74bc85f89d86c22e30716a0ffe80c7e323aeba1d1bfd5
-
SSDEEP
98304:pX4FOjfU2T1e3v+L26AaNeWgPhlmVqkQ7XSKVtP5:V4FmMj+4SqP5
Malware Config
Extracted
quasar
1.4.1
Office04
studies-nearby.gl.at.ply.gg:54354
ed6f2980-f798-413a-90ea-280e7a8f7ce7
-
encryption_key
4AE6940760440BA087A77A58D1B15E8AD494E934
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
njrat
0.7d
HacKed
hakim32.ddns.net:2000
race-through.gl.at.ply.gg:54395
034a0ecc052628afea4e468544bba5d2
-
reg_key
034a0ecc052628afea4e468544bba5d2
-
splitter
|'|'|
Extracted
asyncrat
0.5.8
Default
iraq-mn.gl.at.ply.gg:54391
dyo8kO8l3gKv
-
delay
3
-
install
true
-
install_file
E.exe
-
install_folder
%AppData%
Targets
-
-
Target
734a651df8e337d0ce287b737eda1ba09e11b3ac00b7aa00c0b4ff66b67a8f40
-
Size
4.1MB
-
MD5
c1d4a5533effd830b2511e3d36126dbf
-
SHA1
d67fdc24d7602e6c8b1a5bdbb46fe1bfeee8ec25
-
SHA256
734a651df8e337d0ce287b737eda1ba09e11b3ac00b7aa00c0b4ff66b67a8f40
-
SHA512
1495e65c0048d9addeba488cb522854d0c1f60e74911cc7b0a356524b8c423f6225b320392bdfb7e6ad74bc85f89d86c22e30716a0ffe80c7e323aeba1d1bfd5
-
SSDEEP
98304:pX4FOjfU2T1e3v+L26AaNeWgPhlmVqkQ7XSKVtP5:V4FmMj+4SqP5
-
Quasar payload
-
Async RAT payload
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1