General

  • Target

    c28ef8671a7f140f9385ab177e38844b.bin

  • Size

    485KB

  • Sample

    241120-b3mazssmbq

  • MD5

    f591f3eba9c11b9dd82dfc11681ae35c

  • SHA1

    912b4593bb7df8a6e873e2384f206efed4efb9ca

  • SHA256

    49260429c2d19497a59a7526f51bf6ed76131844a5bfd58ae863d38868d74440

  • SHA512

    b423d64e2b9d2ec35b29aa6a737f9eb8befa46f3102cabd4aadc5644b4d2b6bcc7771e3496c97f1943f51f452e9e5b7c20d1f19ee0c603e32229381130d2c8a8

  • SSDEEP

    12288:v5vHQdapiVDfsUNpucm/W+KCjYCeqxplocaKcUoo1DbTKOhODkCjfl:v5PnmvUc8k3fcnK2ODfl

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Chim

C2

aboushagor.ydns.eu:6542

Mutex

0b30f45d-3c54-4926-a32f-8a1dc077eb21

Attributes
  • encryption_key

    799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277

  • install_name

    windows update.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    svchost

  • subdirectory

    SubDir

Targets

    • Target

      ffa58ebc168e4a19c311097b97645a5d8801db2326f4e8784b634c3e2e2de991.exe

    • Size

      1.4MB

    • MD5

      c28ef8671a7f140f9385ab177e38844b

    • SHA1

      4cc35c23f2ce252413249ecd2ea47967fc00d5a4

    • SHA256

      ffa58ebc168e4a19c311097b97645a5d8801db2326f4e8784b634c3e2e2de991

    • SHA512

      6ce012bf3c1024eef4a47f54c86e3819175816d6c39bfa2216d1d522fc9612637473d8c6be2f4f203f52fc38c2bf887ed6e748ff5c18ee960fb0d82014ade82a

    • SSDEEP

      12288:2fcOokxZ4FK9VlPprK7w5NljuDvdLwLEcXq8dxSaDygxpy3nZOJcllvB:2P8FMhQiXhxkKcOUv

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks