General

  • Target

    11.exe

  • Size

    3.1MB

  • Sample

    241025-bk8q9szhnp

  • MD5

    c93d94b0a449844d3667b6010fe5aade

  • SHA1

    13b8c92ee9a65b38cde39ad57c2831f94ea6e276

  • SHA256

    28db0254d5d08b04428d539f75e6f4768a708cb87967a400fbdcc93666feb902

  • SHA512

    e6c69095747cac933c6738ec11e6dec371a949f26cbfb4ca80091e03d92d039c037dc26136321bde5781636dab6780b7b5f428ab6fc87760b365f1853e71831b

  • SSDEEP

    49152:PvAt62XlaSFNWPjljiFa2RoUYIMckP8yK3oGdDoTHHB72eh2NT:Pvs62XlaSFNWPjljiFXRoUYIMckO

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

2.tcp.us-cal-1.ngrok.io:12557

Mutex

0562a50f-52b7-4929-bdf5-c357a23b94cf

Attributes
  • encryption_key

    08AB3752308D3103CD53B7F871667B69AEA33E27

  • install_name

    LOGI_INT.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    LOGI_INT

  • subdirectory

    SubDir

Targets

    • Target

      11.exe

    • Size

      3.1MB

    • MD5

      c93d94b0a449844d3667b6010fe5aade

    • SHA1

      13b8c92ee9a65b38cde39ad57c2831f94ea6e276

    • SHA256

      28db0254d5d08b04428d539f75e6f4768a708cb87967a400fbdcc93666feb902

    • SHA512

      e6c69095747cac933c6738ec11e6dec371a949f26cbfb4ca80091e03d92d039c037dc26136321bde5781636dab6780b7b5f428ab6fc87760b365f1853e71831b

    • SSDEEP

      49152:PvAt62XlaSFNWPjljiFa2RoUYIMckP8yK3oGdDoTHHB72eh2NT:Pvs62XlaSFNWPjljiFXRoUYIMckO

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks