General

  • Target

    999.exe

  • Size

    3.1MB

  • Sample

    241025-bfzb2azgjj

  • MD5

    983d530245caa91b17923ad5c22d5a05

  • SHA1

    7258015623307e65f8ca13d40bb2885efbe60b37

  • SHA256

    fb51d3cb76e8bc633c28d25a45b21ac3c906da0c5cfa2deabfaf37169d1847f3

  • SHA512

    8f6e4cb59ef7a5c5bfe602e25969811efa894b55446b15dca42ad162628e2cfe48c470f7907bd39350e465b7cf168c60a4d57e023800358d8c917ba07c826b9f

  • SSDEEP

    49152:GvBt62XlaSFNWPjljiFa2RoUYIhfRJ6AbR3LoGd3dTHHB72eh2NT:Gvr62XlaSFNWPjljiFXRoUYIhfRJ6a

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

2.tcp.us-cal-1.ngrok.io:14537

Mutex

b727f93b-76e6-4279-a76d-61b9727ef2c9

Attributes
  • encryption_key

    B3CE4ADBCFC896D87D5632035EB0E3D075AB14F9

  • install_name

    LOGI_INT.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    LOGI_INT

  • subdirectory

    SubDir

Targets

    • Target

      999.exe

    • Size

      3.1MB

    • MD5

      983d530245caa91b17923ad5c22d5a05

    • SHA1

      7258015623307e65f8ca13d40bb2885efbe60b37

    • SHA256

      fb51d3cb76e8bc633c28d25a45b21ac3c906da0c5cfa2deabfaf37169d1847f3

    • SHA512

      8f6e4cb59ef7a5c5bfe602e25969811efa894b55446b15dca42ad162628e2cfe48c470f7907bd39350e465b7cf168c60a4d57e023800358d8c917ba07c826b9f

    • SSDEEP

      49152:GvBt62XlaSFNWPjljiFa2RoUYIhfRJ6AbR3LoGd3dTHHB72eh2NT:Gvr62XlaSFNWPjljiFXRoUYIhfRJ6a

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks