Resubmissions

30-10-2024 11:53

241030-n2cflstqfl 10

General

  • Target

    rezprivwoofer.7z

  • Size

    922KB

  • Sample

    241030-n2cflstqfl

  • MD5

    ce9fffb471e829d7699de686effc9da9

  • SHA1

    02e1a328bd7f7fbca2d10262d41c990c23bdc7e3

  • SHA256

    6be1cae3cc032014e34c3a79e24aafd051639b807db79ea56d493d9203c2ac89

  • SHA512

    b5bb21080c465a8c2ee24e8e83f274d95793932243465ffd7e4fdee5d34430039a81e70494bdd0f575ba5e1405fc62b01dfd4eb0a2a2cd101559c91c7e6c8204

  • SSDEEP

    24576:z8rEMh0iV0E7rx/oK4e4lPlpgZq5hG9bLMk:z84MJ0E7rx/B8BbgZq5hYLr

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.1.28:4782

Mutex

d77230bf-9913-4330-a1f9-b2094453e604

Attributes
  • encryption_key

    954674A032C3A24E1CEB078DEAC16D915B41486D

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      rezprivwoofer/TempWoofpriv.exe

    • Size

      3.1MB

    • MD5

      b9aee7a92f002f80a6b04c252b05bb29

    • SHA1

      4e186ba6d401d5e45627ac789d3cf22d19698b8c

    • SHA256

      72f27c509e27de2edbe9d98fa9258624260d3cabd7b9932636dceb610180d7ef

    • SHA512

      b3f899e279c6f72cb8517160b747bcd44339909b61a82e4304d1e29e9e5da9506acdde8531d25ed3a3506781743c74427437dcfc6981bc992fdb5d83652cb6cd

    • SSDEEP

      49152:6vWI22SsaNYfdPBldt698dBcjHRwn85kbRULoGdWiTHHB72eh2NT:6v722SsaNYfdPBldt6+dBcjHRwn85XG

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks