General

  • Target

    burpsuite2.2.EXE

  • Size

    208.5MB

  • Sample

    241126-h3b9cazrb1

  • MD5

    e65eadc039a63720027b5806936bb1f6

  • SHA1

    608d8d9ef45b0bf71257078ca8a68bcd5fe1ec49

  • SHA256

    99df601daf636cfc09df2eeceb7a9bcbb98c0798eac147f379cfcb2c2853d69c

  • SHA512

    d113f24f4be83c71142df7a19c0c67da89a7e79286692621c8da03f30c0ec18ff2e4dd6957d5a8c7b3e05354cb26428a873fc04909ceb5800e5ef9021126bcd1

  • SSDEEP

    6291456:ZY6l+mOWCkh3PjGl8bJcA8HKWEuxp5HT:m6l+mO6tPKMJUqWEuxv

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

systemsom

C2

systemsom.ddns.net:4444

Mutex

QSR_MUTEX_yUyz7QlfeoeehMJRGY

Attributes
  • encryption_key

    mWoA6fgoQ3ThegdvvCAD

  • install_name

    shost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    mcsftt

  • subdirectory

    micsft

Targets

    • Target

      burpsuite2.2.EXE

    • Size

      208.5MB

    • MD5

      e65eadc039a63720027b5806936bb1f6

    • SHA1

      608d8d9ef45b0bf71257078ca8a68bcd5fe1ec49

    • SHA256

      99df601daf636cfc09df2eeceb7a9bcbb98c0798eac147f379cfcb2c2853d69c

    • SHA512

      d113f24f4be83c71142df7a19c0c67da89a7e79286692621c8da03f30c0ec18ff2e4dd6957d5a8c7b3e05354cb26428a873fc04909ceb5800e5ef9021126bcd1

    • SSDEEP

      6291456:ZY6l+mOWCkh3PjGl8bJcA8HKWEuxp5HT:m6l+mO6tPKMJUqWEuxv

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks