Resubmissions

06-11-2024 18:30

241106-w5he2avgka 10

General

  • Target

    ShcLoader.exe

  • Size

    3.2MB

  • Sample

    241106-w5he2avgka

  • MD5

    5035c5a044bc9d4a912d54b9d3342082

  • SHA1

    25714bbf1aaea6c0d1ff128ef3d2ad5095da63a3

  • SHA256

    583dec28f988dba9a35801b8dc3c0ce3741909aaf6e3ea31e5d823659e43209f

  • SHA512

    df1cc57366a31dc1dac97f2f3194ebfca5c9329c4ecc27fe4a33efdfeb244d479ff2a2ff07e4e9dfdfe00a0b8b4eed3a45155bd1b62276007d9e61d933e3f78f

  • SSDEEP

    98304:PDk4gOxkBVHpKEYWJMTER11yJKwFWMbeIc:PDng1V2WOg/MKws+e/

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Client

C2

x0p-52599.portmap.host:52599

Mutex

1e8d1992-25ef-4495-bdc8-388b816e4b2b

Attributes
  • encryption_key

    6CCE3B8C0D5A5CF28100953354AB7774A28FB355

  • install_name

    Client.exe

  • log_directory

    $xor-logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      ShcLoader.exe

    • Size

      3.2MB

    • MD5

      5035c5a044bc9d4a912d54b9d3342082

    • SHA1

      25714bbf1aaea6c0d1ff128ef3d2ad5095da63a3

    • SHA256

      583dec28f988dba9a35801b8dc3c0ce3741909aaf6e3ea31e5d823659e43209f

    • SHA512

      df1cc57366a31dc1dac97f2f3194ebfca5c9329c4ecc27fe4a33efdfeb244d479ff2a2ff07e4e9dfdfe00a0b8b4eed3a45155bd1b62276007d9e61d933e3f78f

    • SSDEEP

      98304:PDk4gOxkBVHpKEYWJMTER11yJKwFWMbeIc:PDng1V2WOg/MKws+e/

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks