General

  • Target

    a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a

  • Size

    5.8MB

  • Sample

    241128-clsl4szrhv

  • MD5

    7f4092487f658020d13296690668d937

  • SHA1

    4c2e7041e90f7f651c3f514f092260fdf38d23e4

  • SHA256

    a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a

  • SHA512

    bf24517138ae37ad6dbb5aec2272b0db9a7aa9c38e8b1928a4e6223c624592bf2fff2ce27e3971329bd829667cfd5722ce1906b55ebb779b421bd8ec3aae749b

  • SSDEEP

    98304:VdAle+Q5MpCOKdEJFZPG+chrvWREYJSqKpwR5agwxo7CH+TY9PcFO3y9jmKn+HBT:bkgMpCOL++KYMqDbSVdRf3y9jKH+U

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

XXXNewsgroupdirect

C2

jwy1nw4mcx2svbmvgo76.ru:4782

o6tqyui3rxxk2sfghduiypzz7pxlym.ru:4782

RHjqJCxmCalXXEe.ru:4782

xMfLSMPKBWsgmUC.ru:4782

FHXvaxLSFIDvieO.ru:4782

QfFaRBPqOoJQqEF.ru:4782

moNxVtjgeWpPVUz.ru:4782

JDIsOivQCBlbzlN.ru:4782

DGnZQjkVDhsxgVV.ru:4782

ByZBzewBiKXuqUR.ru:4782

ytXDZUKKgHETqys.ru:4782

yPZmTJDDnmJhkwf.ru:4782

QVggEpcffTSfXLG.ru:4782

DqUTFasmBwlEIBT.ru:4782

VYJjpyHabYhrJDd.ru:4782

RgNSTMHSnjafPEX.ru:4782

Mutex

HoQcpHAOBoMWu5FCve

Attributes
  • encryption_key

    VJrLu7UGImn19bb9qL6Z

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a

    • Size

      5.8MB

    • MD5

      7f4092487f658020d13296690668d937

    • SHA1

      4c2e7041e90f7f651c3f514f092260fdf38d23e4

    • SHA256

      a8f8595e1b3174a4cc26bde2e09cbd02319fe2a5588af2143af336a6d091107a

    • SHA512

      bf24517138ae37ad6dbb5aec2272b0db9a7aa9c38e8b1928a4e6223c624592bf2fff2ce27e3971329bd829667cfd5722ce1906b55ebb779b421bd8ec3aae749b

    • SSDEEP

      98304:VdAle+Q5MpCOKdEJFZPG+chrvWREYJSqKpwR5agwxo7CH+TY9PcFO3y9jmKn+HBT:bkgMpCOL++KYMqDbSVdRf3y9jKH+U

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks