Resubmissions

02-11-2024 04:50

241102-fgf93axpav 10

General

  • Target

    text.txt

  • Size

    103B

  • Sample

    241102-fgf93axpav

  • MD5

    181acbc86809adb53c626c41f110232b

  • SHA1

    fc964fbf9653e17776b0772810f13667f1d08ca2

  • SHA256

    6d4a4d03e1313c9934ba3223e408ba1c18d4e00efc4205e229e10468b5b6d327

  • SHA512

    6c5c9daa0c022b9de83ff49058d531ff3904f974253a435a3be35b9c307f2f2b9f4894818065cf700ad169ab836cafc66f8bb385bd7d9dd0c6eddb526e2ef018

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

VTROY

C2

31.13.224.12:61512

31.13.224.13:61513

Mutex

QSR_MUTEX_4Q2rJqiVyC7hohzbjx

Attributes
  • encryption_key

    7Vp2dMCHrMjJthQ2Elyy

  • install_name

    downloads.exe

  • log_directory

    Logs

  • reconnect_delay

    5000

  • startup_key

    cssrse.exe

  • subdirectory

    downloadupdates

Targets

    • Target

      text.txt

    • Size

      103B

    • MD5

      181acbc86809adb53c626c41f110232b

    • SHA1

      fc964fbf9653e17776b0772810f13667f1d08ca2

    • SHA256

      6d4a4d03e1313c9934ba3223e408ba1c18d4e00efc4205e229e10468b5b6d327

    • SHA512

      6c5c9daa0c022b9de83ff49058d531ff3904f974253a435a3be35b9c307f2f2b9f4894818065cf700ad169ab836cafc66f8bb385bd7d9dd0c6eddb526e2ef018

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks