General

  • Target

    hand.bat

  • Size

    7.0MB

  • Sample

    241119-z9bptsxqfp

  • MD5

    1a013c7ac90b58073895b26cae70def7

  • SHA1

    60c9c3294fc7ac3d336a478274f62f4818498230

  • SHA256

    698b1f0a35a76e57adef388612b29902f86f56983c772d7c6c17b4483c2be688

  • SHA512

    c1bbb52e8546b352e041e944d7dfa158d5dc9a51b1628128d345e4a9e708871d7a1f5e59cc44a2c66f8dc9af81ec06e1b5105d5a7292497075564496f3b0ec75

  • SSDEEP

    49152:vZrlGoT+Xts/LJjeDPnIwT0ZFBZP2x3fLKs0HMb0DprNMiKwPjp9Kw2EdF8d7nrx:Y

Malware Config

Extracted

Family

quasar

Attributes
  • encryption_key

    1162A0E173FED8E7CF598896A547E279E681EE6F

  • reconnect_delay

    3000

Targets

    • Target

      hand.bat

    • Size

      7.0MB

    • MD5

      1a013c7ac90b58073895b26cae70def7

    • SHA1

      60c9c3294fc7ac3d336a478274f62f4818498230

    • SHA256

      698b1f0a35a76e57adef388612b29902f86f56983c772d7c6c17b4483c2be688

    • SHA512

      c1bbb52e8546b352e041e944d7dfa158d5dc9a51b1628128d345e4a9e708871d7a1f5e59cc44a2c66f8dc9af81ec06e1b5105d5a7292497075564496f3b0ec75

    • SSDEEP

      49152:vZrlGoT+Xts/LJjeDPnIwT0ZFBZP2x3fLKs0HMb0DprNMiKwPjp9Kw2EdF8d7nrx:Y

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks