General

  • Target

    VaporWave2-1.exe

  • Size

    72.5MB

  • Sample

    241107-gg2rfaxcml

  • MD5

    af85b5d9c237ea75d4a307d5157c847f

  • SHA1

    84ad14e5d89bd85f0ef1bb5f3269c0d6929c6a53

  • SHA256

    3e7fe3f421b50a884cc30ac892a739e895f4243ed554183deebc7415593ee2d2

  • SHA512

    bf2e7414f1e00d69aaf3dab61a938c3051f429b712d8dcccd3f7a7a32226d42dc66477c1fac7cbb67a326dd05b33de7afbc176ce4280405ac69e2e8dcbdabca3

  • SSDEEP

    6144:UI6bPXhLApfpo8CL1g1N1ZflpUwGbeCqgHcFi9vNnoGjlhjl7k4:lmhAp5CL1g1N1ZfXxpi9vhHl1l7k4

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

general1

C2

servicehos.zapto.org:4444

Mutex

QSR_MUTEX_ksxWAP4ziOqMlreofU

Attributes
  • encryption_key

    i9HUVkY4QNExDOHIMtIX

  • install_name

    svchost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    svchost

  • subdirectory

    SubDir

Targets

    • Target

      VaporWave2-1.exe

    • Size

      72.5MB

    • MD5

      af85b5d9c237ea75d4a307d5157c847f

    • SHA1

      84ad14e5d89bd85f0ef1bb5f3269c0d6929c6a53

    • SHA256

      3e7fe3f421b50a884cc30ac892a739e895f4243ed554183deebc7415593ee2d2

    • SHA512

      bf2e7414f1e00d69aaf3dab61a938c3051f429b712d8dcccd3f7a7a32226d42dc66477c1fac7cbb67a326dd05b33de7afbc176ce4280405ac69e2e8dcbdabca3

    • SSDEEP

      6144:UI6bPXhLApfpo8CL1g1N1ZflpUwGbeCqgHcFi9vNnoGjlhjl7k4:lmhAp5CL1g1N1ZfXxpi9vhHl1l7k4

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks