General

  • Target

    VaporWaveX2.1.rar

  • Size

    72.5MB

  • Sample

    241107-tkxywavhlf

  • MD5

    c1b8933cfb2e489e8601d151bb291fb1

  • SHA1

    fa62983e1a63940f55a25cd6f872b2f0206a94ad

  • SHA256

    ffd1d3a0e43ff0ba827e83fccc2515392e2d08719338219d200b8a310c5acdb6

  • SHA512

    e501a5a88047e0f974355c1a703303edba46c187c0c8bb24be6bcdaffc3c357923d982797cae82cd1f5c89fd8bb40391b0995093da9be18d428700b3a4a23eed

  • SSDEEP

    1572864:OPWU7/Jq6WgiEaArvFfrdpT/3BTkwHmkuiH09i4h5gmIKTv6yjZOE:Oftq6W7A7xLTfBTgkuAjm5rz1OE

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

general1

C2

servicehos.zapto.org:4444

Mutex

QSR_MUTEX_ksxWAP4ziOqMlreofU

Attributes
  • encryption_key

    i9HUVkY4QNExDOHIMtIX

  • install_name

    svchost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    svchost

  • subdirectory

    SubDir

Targets

    • Target

      VaporWaveX2.1.rar

    • Size

      72.5MB

    • MD5

      c1b8933cfb2e489e8601d151bb291fb1

    • SHA1

      fa62983e1a63940f55a25cd6f872b2f0206a94ad

    • SHA256

      ffd1d3a0e43ff0ba827e83fccc2515392e2d08719338219d200b8a310c5acdb6

    • SHA512

      e501a5a88047e0f974355c1a703303edba46c187c0c8bb24be6bcdaffc3c357923d982797cae82cd1f5c89fd8bb40391b0995093da9be18d428700b3a4a23eed

    • SSDEEP

      1572864:OPWU7/Jq6WgiEaArvFfrdpT/3BTkwHmkuiH09i4h5gmIKTv6yjZOE:Oftq6W7A7xLTfBTgkuAjm5rz1OE

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks