General

  • Target

    67eea4de4c8b5f49ee6feb688c0060c7.bin

  • Size

    3.6MB

  • Sample

    241107-btm6xssdnd

  • MD5

    10461f78434e31c0b10c276e565b6394

  • SHA1

    9519623216906963c47db7e47f18e49b87038544

  • SHA256

    68cbdca0e0174a509f79c50d35c832b20578e0ff63a14e8dd26073b974a8909f

  • SHA512

    a598106657833c1f1c17cac0fde96a1843776a98c55028b1da47b1e3aa210fbfe8f8c80d515130a46e59c963ac70f59b1b774786e11d7e8f4cb605284c4e2134

  • SSDEEP

    49152:nI36MbhixfCRLR9Ge6WqEKPQyGWV6Oe9vrFlFrQeXwXHZ+TrBq5JDwO96WKM75Cf:IB0fu6XEKP3r67jgJeBqD0WjtLtC5

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

DAVE

C2

hoffmann3.ydns.eu:5829

bich23.ydns.eu:5829

Mutex

309db0e8-63c5-4e08-a2f3-92745d11177da5

Attributes
  • encryption_key

    C5B555A83D127A9553D4FB1FCECB35CE8E91A447

  • install_name

    outlook.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Outlook

  • subdirectory

    WindowsUpdate

Targets

    • Target

      90df3fa2c8b6470115f4f8a4ac955bfa35b07ac6d4d796da6f99c89dbb1820a0.exe

    • Size

      3.7MB

    • MD5

      67eea4de4c8b5f49ee6feb688c0060c7

    • SHA1

      fd390e9e0ef5c59ff4750f74a1770da2c3ef993d

    • SHA256

      90df3fa2c8b6470115f4f8a4ac955bfa35b07ac6d4d796da6f99c89dbb1820a0

    • SHA512

      df9ff675ea6fae9b26a1e0aa6085d674012d44f057c8669ac469b55c5f3a3565c9c4abec7f8b87ea653751db51e6ee219b17b5d45a5a52c1d33ff4c0df86fc4f

    • SSDEEP

      98304:bVQ4wA0cWyRF1FBOOvfjukPW5hrDksmz6Nlk:YyZFBNfjzYhrDY6

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks