General

  • Target

    Adobe.rar

  • Size

    612.5MB

  • Sample

    241110-njbflawdnb

  • MD5

    6a72602258012e400b40ad018f6885f3

  • SHA1

    01200a06e3078e434899b733f1e3968755e3bee3

  • SHA256

    dd07e0d43e01089a7962b4f6329923e524d0ec92a79255697d92b865d519c410

  • SHA512

    1bec325a8d906f5ee34761127769d9711b772ae31069746014e4da7283373a4c1d439732938a586a8bd47dd76f3ceb062ef517966730353a0ea9f3c78cb8fd19

  • SSDEEP

    12582912:m64MUljG/WAM5a0lAuMCPVR8gUHqpXksmTZJhtDpoILRYHh9zZ6O:hchcAI0+up8gUKpFmTznNfRcHZB

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

GRAPHISOFT ArchiCAD 26 Build!!

C2

iniwork.4cloud.click:1980

Mutex

47XhrAfV3mT6HsUu8d

Attributes
  • encryption_key

    CU7wKvrAqbLlamz4XKEi

  • install_name

    helpar.exe

  • log_directory

    HDR

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    HERLPAR

Targets

    • Target

      Adobe.rar

    • Size

      612.5MB

    • MD5

      6a72602258012e400b40ad018f6885f3

    • SHA1

      01200a06e3078e434899b733f1e3968755e3bee3

    • SHA256

      dd07e0d43e01089a7962b4f6329923e524d0ec92a79255697d92b865d519c410

    • SHA512

      1bec325a8d906f5ee34761127769d9711b772ae31069746014e4da7283373a4c1d439732938a586a8bd47dd76f3ceb062ef517966730353a0ea9f3c78cb8fd19

    • SSDEEP

      12582912:m64MUljG/WAM5a0lAuMCPVR8gUHqpXksmTZJhtDpoILRYHh9zZ6O:hchcAI0+up8gUKpFmTznNfRcHZB

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Modifies Windows Firewall

    • A potential corporate email address has been identified in the URL: [email protected]

    • Checks QEMU agent file

      Checks presence of QEMU agent, possibly to detect virtualization.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks