General

  • Target

    8cbbbbc1432a5368e903073e28c54603.bin

  • Size

    394KB

  • Sample

    241120-bt7wbsxhnn

  • MD5

    12181f8199a7570dc7efda015bba93f8

  • SHA1

    ffe3bc16028aac9ac2f8dddcc8f0977256fd0db8

  • SHA256

    dce9a2540095326097381b7609b1f5a2481a3cd9f7089c4a65d42a1b9a2378b6

  • SHA512

    6f423520998ae7338e0b23fb0a8320d0be3a6f66eb4caa0016b221199aded0812dd1dd108415777f6509a9089adb26c8752ebbb471c5dddd73f8d6ffdbb34ca8

  • SSDEEP

    12288:2AUu7HHoG/38pPGOXrUijz9EFLMscke62t:2AUuDoA3wPGO7Uuz9EyLt

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Chim

C2

aboushagor.ydns.eu:6542

Mutex

0b30f45d-3c54-4926-a32f-8a1dc077eb21

Attributes
  • encryption_key

    799E5C34BA6EC18D72E269D0C5CF1A5AC1AD9277

  • install_name

    windows update.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    svchost

  • subdirectory

    SubDir

Targets

    • Target

      New Purchase Order-0304243220- SMART SOURCING INC.pdf____________________________________________________.exe

    • Size

      1.4MB

    • MD5

      c28ef8671a7f140f9385ab177e38844b

    • SHA1

      4cc35c23f2ce252413249ecd2ea47967fc00d5a4

    • SHA256

      ffa58ebc168e4a19c311097b97645a5d8801db2326f4e8784b634c3e2e2de991

    • SHA512

      6ce012bf3c1024eef4a47f54c86e3819175816d6c39bfa2216d1d522fc9612637473d8c6be2f4f203f52fc38c2bf887ed6e748ff5c18ee960fb0d82014ade82a

    • SSDEEP

      12288:2fcOokxZ4FK9VlPprK7w5NljuDvdLwLEcXq8dxSaDygxpy3nZOJcllvB:2P8FMhQiXhxkKcOUv

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks