General

  • Target

    dc6032bb4d1d30872419a285faf9e3cc8829d6b826151b61317e85cb5e0cec83

  • Size

    1.3MB

  • Sample

    241111-h651tswcjg

  • MD5

    092a56d2ffbc62dad8d8a3864fd046fe

  • SHA1

    e90b1e199a1df28a2b748340b3a90a3e6112c058

  • SHA256

    dc6032bb4d1d30872419a285faf9e3cc8829d6b826151b61317e85cb5e0cec83

  • SHA512

    f6215dfd153385b49bf7b2cdb95bc45a2fb45be4ee295448d1bea946199e660ebcb920746388262e05405dc239478f1d4b156bbb03f66c0fb1702df88fba5470

  • SSDEEP

    24576:6gZml969wUGPr2uGKFzFTSpkPNnJJUwEbkWppzscd1:65769PaFTFNn/Uwyzppz

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

PC01

C2

Dejvicek-46680.portmap.host:46680

Mutex

5f92fc2b-da3a-4aeb-ba6a-9b3d116a65dd

Attributes
  • encryption_key

    32B21847D3A2E85D5FC0279E929E168D73071B91

  • install_name

    Discord.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Discord

  • subdirectory

    discord

Targets

    • Target

      dc6032bb4d1d30872419a285faf9e3cc8829d6b826151b61317e85cb5e0cec83

    • Size

      1.3MB

    • MD5

      092a56d2ffbc62dad8d8a3864fd046fe

    • SHA1

      e90b1e199a1df28a2b748340b3a90a3e6112c058

    • SHA256

      dc6032bb4d1d30872419a285faf9e3cc8829d6b826151b61317e85cb5e0cec83

    • SHA512

      f6215dfd153385b49bf7b2cdb95bc45a2fb45be4ee295448d1bea946199e660ebcb920746388262e05405dc239478f1d4b156bbb03f66c0fb1702df88fba5470

    • SSDEEP

      24576:6gZml969wUGPr2uGKFzFTSpkPNnJJUwEbkWppzscd1:65769PaFTFNn/Uwyzppz

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks