General

  • Target

    5t2363223623312sdsafgdf.exe

  • Size

    3.1MB

  • Sample

    241024-aj929sxhrl

  • MD5

    74fcf7ab924850fe95eed572e75a8e91

  • SHA1

    ad8da638e83f9953b74b74b7e0f5cd3fc91b5309

  • SHA256

    3a4eaaf270fece850ea5fde3dbb2f9951e67b0651cb7bab1d6fa8c509ee03597

  • SHA512

    722cc4c7a8472dd4b8f733b4a5da9a8ffa2af319c673be3f1788307d13ff2c6498c865edac9ddbf21cf500dfcb185e5d6c16c59d0d2d379a3e92b366f06d75f6

  • SSDEEP

    49152:+vBt62XlaSFNWPjljiFa2RoUYIwxDE/gHk/JxBoGddOTHHB72eh2NT:+vr62XlaSFNWPjljiFXRoUYIwxQL

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

0.tcp.us-cal-1.ngrok.io:10025

Mutex

093ad4d0-ac96-49ac-a21d-e2ecfcdc257f

Attributes
  • encryption_key

    64E5F426F36D28C0743F6DA157D86F7805E54413

  • install_name

    LOGI_INT.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    LOGI_INT

  • subdirectory

    SubDir

Targets

    • Target

      5t2363223623312sdsafgdf.exe

    • Size

      3.1MB

    • MD5

      74fcf7ab924850fe95eed572e75a8e91

    • SHA1

      ad8da638e83f9953b74b74b7e0f5cd3fc91b5309

    • SHA256

      3a4eaaf270fece850ea5fde3dbb2f9951e67b0651cb7bab1d6fa8c509ee03597

    • SHA512

      722cc4c7a8472dd4b8f733b4a5da9a8ffa2af319c673be3f1788307d13ff2c6498c865edac9ddbf21cf500dfcb185e5d6c16c59d0d2d379a3e92b366f06d75f6

    • SSDEEP

      49152:+vBt62XlaSFNWPjljiFa2RoUYIwxDE/gHk/JxBoGddOTHHB72eh2NT:+vr62XlaSFNWPjljiFXRoUYIwxQL

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks