General

  • Target

    7u45745967.exe

  • Size

    3.1MB

  • Sample

    241024-agtbqsvhra

  • MD5

    dadd4502cec83146bc01bd9e01e9e4ad

  • SHA1

    c7c7def14dd5f15e92a4227be4c5ad3af175a2ca

  • SHA256

    0f89689dce10772f4f7ad3c2431ec808fd53a40a93314a2a22ef1b63eb21b37b

  • SHA512

    4d25597282663c033eadafc755ad2e1f6c6700a601ea0f64f7a8922c41be2aeba3f3d5479a904ed0461ad51ffc3256963b0fbb5c9f8b366a94767b218ef08f8f

  • SSDEEP

    49152:GvBt62XlaSFNWPjljiFa2RoUYIioxNESEek/isLoGdI5THHB72eh2NT:Gvr62XlaSFNWPjljiFXRoUYINx1y

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

4.tcp.us-cal-1.ngrok.io:11073

Mutex

5ef8baaf-b402-47aa-8c01-abb78e86878b

Attributes
  • encryption_key

    64E5F426F36D28C0743F6DA157D86F7805E54413

  • install_name

    LOGI_INT.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    LOGI_INT

  • subdirectory

    SubDir

Targets

    • Target

      7u45745967.exe

    • Size

      3.1MB

    • MD5

      dadd4502cec83146bc01bd9e01e9e4ad

    • SHA1

      c7c7def14dd5f15e92a4227be4c5ad3af175a2ca

    • SHA256

      0f89689dce10772f4f7ad3c2431ec808fd53a40a93314a2a22ef1b63eb21b37b

    • SHA512

      4d25597282663c033eadafc755ad2e1f6c6700a601ea0f64f7a8922c41be2aeba3f3d5479a904ed0461ad51ffc3256963b0fbb5c9f8b366a94767b218ef08f8f

    • SSDEEP

      49152:GvBt62XlaSFNWPjljiFa2RoUYIioxNESEek/isLoGdI5THHB72eh2NT:Gvr62XlaSFNWPjljiFXRoUYINx1y

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks