General

  • Target

    2024-11-15_be97d2a18bd4e9eb41f80f3e3a71656a_luca-stealer_magniber

  • Size

    5.2MB

  • Sample

    241115-sxtljswgqr

  • MD5

    be97d2a18bd4e9eb41f80f3e3a71656a

  • SHA1

    f181fb8964b4f7be4a69fc196ec9b95c5b575ea2

  • SHA256

    fa59119030b7d7291f97ea16728f592d3e2ea1aab62172e0b57a60db818ea082

  • SHA512

    170d383ef0418ce3a533487d99ffa8ca47ad843040747bd98a48f73867c57570f7c37429a8c0c92172f14fa902666bfa195d42a2a2cdf838ab01816313135632

  • SSDEEP

    98304:SCYMqfuEk+8WwFsBSSUCa9qyr1ijMauCDhg0eUAnMyApx0GXtRnWV:xYMqfuEk+8W0bzJVauCDT0MyApxPjWV

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

1

C2

127.0.0.1:4782

Mutex

5313dac9-d7fe-402d-ba5b-5c27a31badf6

Attributes
  • encryption_key

    597DA3394F4E2AF05CA763935FC87776B4F9F811

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      2024-11-15_be97d2a18bd4e9eb41f80f3e3a71656a_luca-stealer_magniber

    • Size

      5.2MB

    • MD5

      be97d2a18bd4e9eb41f80f3e3a71656a

    • SHA1

      f181fb8964b4f7be4a69fc196ec9b95c5b575ea2

    • SHA256

      fa59119030b7d7291f97ea16728f592d3e2ea1aab62172e0b57a60db818ea082

    • SHA512

      170d383ef0418ce3a533487d99ffa8ca47ad843040747bd98a48f73867c57570f7c37429a8c0c92172f14fa902666bfa195d42a2a2cdf838ab01816313135632

    • SSDEEP

      98304:SCYMqfuEk+8WwFsBSSUCa9qyr1ijMauCDhg0eUAnMyApx0GXtRnWV:xYMqfuEk+8W0bzJVauCDT0MyApxPjWV

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks