General

  • Target

    VEGAS_Pro_20.0.0.exe

  • Size

    677.8MB

  • Sample

    241109-ytw56a1drl

  • MD5

    3548345d694b258ecdacfb30bf01ef32

  • SHA1

    cf958f11cd7b52f0395d9cbfc0c7c43b01d55ba8

  • SHA256

    cae8174d33366208ec89a8a16b349f7a78409b7f6421b24c25a1711f222f180b

  • SHA512

    bb2b5c4ef4cdc76a182506dcd44fe1f0d8b5ef81261a1463e1c835a37f6c10e2d9d6daf3381df53649fe0a66aed80aeeebb242a244a094603f168a946272f597

  • SSDEEP

    12582912:VpwoWBS+gchR75aVsLbNWMXOpWe2ejvclvdm7Btj9En2nfwgCnXT:/c4+gGLaVKV5eVvclInfw7

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Vegas

C2

stopman.ooguy.com:1980

craftIP.gize.com:1980

Mutex

hbDAGXDpWKGDNPO4ZT

Attributes
  • encryption_key

    oWXRR9aQDa0d3E44x2b3

  • install_name

    Client.exe

  • log_directory

    mincraft

  • reconnect_delay

    5000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      VEGAS_Pro_20.0.0.exe

    • Size

      677.8MB

    • MD5

      3548345d694b258ecdacfb30bf01ef32

    • SHA1

      cf958f11cd7b52f0395d9cbfc0c7c43b01d55ba8

    • SHA256

      cae8174d33366208ec89a8a16b349f7a78409b7f6421b24c25a1711f222f180b

    • SHA512

      bb2b5c4ef4cdc76a182506dcd44fe1f0d8b5ef81261a1463e1c835a37f6c10e2d9d6daf3381df53649fe0a66aed80aeeebb242a244a094603f168a946272f597

    • SSDEEP

      12582912:VpwoWBS+gchR75aVsLbNWMXOpWe2ejvclvdm7Btj9En2nfwgCnXT:/c4+gGLaVKV5eVvclInfw7

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks