General

  • Target

    035f44415228a4f73d1aab1a7f3ff75b8138f2b093586b49cf4faef32587863b.rar

  • Size

    394KB

  • Sample

    241119-chqcksynew

  • MD5

    8cbbbbc1432a5368e903073e28c54603

  • SHA1

    477f6b0794bbae0c97c7fde59af91e09e09c63ad

  • SHA256

    035f44415228a4f73d1aab1a7f3ff75b8138f2b093586b49cf4faef32587863b

  • SHA512

    ed0d7da138537ccf850f35295bf44b05ea8cb84aba71504b74c20727cfc9373eb8f9c33bd676b39b6647e6ce5941ca2aa37002b8d338e3ad1a895683086bb7a0

  • SSDEEP

    12288:ZctiiLWbhVZ8oYYyCFNCkSMlE7k0ZFCdrfhNVF:AqbhV+o+O3E7Hj+v

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Chim

C2

aboushagor.ydns.eu:6542

Mutex

0b30f45d-3c54-4926-a32f-8a1dc077eb21

Attributes
  • encryption_key

    799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277

  • install_name

    windows update.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    svchost

  • subdirectory

    SubDir

Targets

    • Target

      New Purchase Order-0304243220- SMART SOURCING INC.pdf____________________________________________________.exe

    • Size

      1.4MB

    • MD5

      c28ef8671a7f140f9385ab177e38844b

    • SHA1

      4cc35c23f2ce252413249ecd2ea47967fc00d5a4

    • SHA256

      ffa58ebc168e4a19c311097b97645a5d8801db2326f4e8784b634c3e2e2de991

    • SHA512

      6ce012bf3c1024eef4a47f54c86e3819175816d6c39bfa2216d1d522fc9612637473d8c6be2f4f203f52fc38c2bf887ed6e748ff5c18ee960fb0d82014ade82a

    • SSDEEP

      12288:2fcOokxZ4FK9VlPprK7w5NljuDvdLwLEcXq8dxSaDygxpy3nZOJcllvB:2P8FMhQiXhxkKcOUv

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks