General

  • Target

    7543e6925701f6fde75accb15f483991596b55260b720ba7dbc84cc48eeb27aa.cmd

  • Size

    1.6MB

  • Sample

    241020-ctsl3stcma

  • MD5

    d7239bc304b1d9d4ae192e2570419d53

  • SHA1

    dccb1c1c8021d791852cd5c0dc5c6240be0ed2d1

  • SHA256

    7543e6925701f6fde75accb15f483991596b55260b720ba7dbc84cc48eeb27aa

  • SHA512

    d52dde51b91d287c750e85828ce4dd7a46e0ea2235fd6e63d4e7588745f7e34c198827cccb2d719525ecea5e92a8804377ca193b2d3e1e0e986d4f77d8dd4430

  • SSDEEP

    24576:U6X5+xxQt9059S6lF1Xnu3V9wdo/Z7h6lstvegjMuz0OGSqE2qfv9OU:LpG/h3IHre0zRL

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

walkout.ddnsgeek.com:8080

Mutex

27391f85-a482-471a-b2cd-1f8ab5bde32e

Attributes
  • encryption_key

    6469F8C5BA9A2CFDCF4A3F1651D1E92DBEA41117

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      7543e6925701f6fde75accb15f483991596b55260b720ba7dbc84cc48eeb27aa.cmd

    • Size

      1.6MB

    • MD5

      d7239bc304b1d9d4ae192e2570419d53

    • SHA1

      dccb1c1c8021d791852cd5c0dc5c6240be0ed2d1

    • SHA256

      7543e6925701f6fde75accb15f483991596b55260b720ba7dbc84cc48eeb27aa

    • SHA512

      d52dde51b91d287c750e85828ce4dd7a46e0ea2235fd6e63d4e7588745f7e34c198827cccb2d719525ecea5e92a8804377ca193b2d3e1e0e986d4f77d8dd4430

    • SSDEEP

      24576:U6X5+xxQt9059S6lF1Xnu3V9wdo/Z7h6lstvegjMuz0OGSqE2qfv9OU:LpG/h3IHre0zRL

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

MITRE ATT&CK Enterprise v15

Tasks