General

  • Target

    Facebook breaker.zip

  • Size

    1.2MB

  • Sample

    241104-hasevswgmp

  • MD5

    60baabf5f07b439be78195450dacff3a

  • SHA1

    4c21ad0c866035b9cd720c904c07d6d5a9f47a8c

  • SHA256

    8f379aea1158c492af7bd6361b1b0c8e5b4d2c73062968eb3231da123c4160df

  • SHA512

    bf4d9b38a0575b7fe0200e3145cabd934abf3abd7192f32080c248b847787de724bae8f02ca6df207f75d4557270f8487e87bcc6100016ac27c5bfa61e498fe1

  • SSDEEP

    24576:sPhAekqOX+cSocIXNgg3DZ0dgBBFegQHfmrcFebKpDH8pZJfXm5gQEd:0h+qOOc+IXPDZnFeQrcUKpDcXm5kd

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Víctima

C2

crismulticuenta-30512.portmap.host:30512

Mutex

d7480f6f-e85f-4b68-8813-8279e2e6cb96

Attributes
  • encryption_key

    8497DDBEB7064872EF356A0D1A58DE488578E1E0

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Updater

  • subdirectory

    SubDir

Targets

    • Target

      Facebook breaker.zip

    • Size

      1.2MB

    • MD5

      60baabf5f07b439be78195450dacff3a

    • SHA1

      4c21ad0c866035b9cd720c904c07d6d5a9f47a8c

    • SHA256

      8f379aea1158c492af7bd6361b1b0c8e5b4d2c73062968eb3231da123c4160df

    • SHA512

      bf4d9b38a0575b7fe0200e3145cabd934abf3abd7192f32080c248b847787de724bae8f02ca6df207f75d4557270f8487e87bcc6100016ac27c5bfa61e498fe1

    • SSDEEP

      24576:sPhAekqOX+cSocIXNgg3DZ0dgBBFegQHfmrcFebKpDH8pZJfXm5gQEd:0h+qOOc+IXPDZnFeQrcUKpDcXm5kd

    • Detected bankofmontreal phishing page

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Credentials from Password Stores: Windows Credential Manager

      Suspicious access to Credentials History.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks