General

  • Target

    RobloxPlayerInstaller (13).zip

  • Size

    1.2MB

  • Sample

    241103-wjahaszjfs

  • MD5

    840ef91421c4400dc0a3e1e1f3ef1b92

  • SHA1

    07968814c9bf4a79095521a3d061479fb448b4f2

  • SHA256

    c37d667cca66b515320fa07eaae06bf71500e37710313768ee8c7aafdff1efc0

  • SHA512

    ab9d4e71ab658b234491cb26fce13f9cb26afc02507e7db9c0f394b3aac309e891beaa6e0924e643fc45cad5ab2b6cc486531f9f26df1682cb78ffd108d4838f

  • SSDEEP

    24576:xnyrKuNpHU/A6ujK2zC4MwKi4bKeInEAjlQm5JmDwwyV6CftEecaR3iU:xsBpHeVu2g/hqInPa9e6YEMRyU

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

wagnerpmc-45507.portmap.host:45507

Mutex

b0d8f3fc-8c2a-46fc-be6b-6d1d78af09d4

Attributes
  • encryption_key

    699AAFC4F1EEF370F320C33B8CBBB94DA90459E1

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Window Updater

  • subdirectory

    SubDir

Targets

    • Target

      RobloxPlayerInstaller (13).zip

    • Size

      1.2MB

    • MD5

      840ef91421c4400dc0a3e1e1f3ef1b92

    • SHA1

      07968814c9bf4a79095521a3d061479fb448b4f2

    • SHA256

      c37d667cca66b515320fa07eaae06bf71500e37710313768ee8c7aafdff1efc0

    • SHA512

      ab9d4e71ab658b234491cb26fce13f9cb26afc02507e7db9c0f394b3aac309e891beaa6e0924e643fc45cad5ab2b6cc486531f9f26df1682cb78ffd108d4838f

    • SSDEEP

      24576:xnyrKuNpHU/A6ujK2zC4MwKi4bKeInEAjlQm5JmDwwyV6CftEecaR3iU:xsBpHeVu2g/hqInPa9e6YEMRyU

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks