General

  • Target

    33c16415bb86e33f9c9b5e37a20b875df320cc40f5a1d8d7c067279f1ca04b4bN.exe

  • Size

    3.8MB

  • Sample

    241129-jcxm2asrfy

  • MD5

    74eda795d396603a1b46b93eb10d72f0

  • SHA1

    5ef9985f0ebb66336125f4751c7da012582c9dd4

  • SHA256

    33c16415bb86e33f9c9b5e37a20b875df320cc40f5a1d8d7c067279f1ca04b4b

  • SHA512

    ef87c84b8d8238d8cbf58b2db4f06cabcd9f5c6471e73d5c30f877084586045dbe9ee47ac275bf59d37b66b9aa2a41809561d0aa3dcae43400c0f1537c5668c4

  • SSDEEP

    98304:CUBpeT0riOfERBGWQMYEUDPeuetEnEP4UTfGpFvMvh1u:CUBpeT0unRPQhCuMKUbGpxch1u

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

26-11

C2

maxigym.net:4782

Mutex

579ac83a-8fa5-4dbc-8dcc-c76fafec1a69

Attributes
  • encryption_key

    DD459BB92A43EF8EEB2FE401C8453F685AECE590

  • install_name

    ChromiumDaemon.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Chromium Extentions Service

  • subdirectory

    ChromiumExtentions

Targets

    • Target

      33c16415bb86e33f9c9b5e37a20b875df320cc40f5a1d8d7c067279f1ca04b4bN.exe

    • Size

      3.8MB

    • MD5

      74eda795d396603a1b46b93eb10d72f0

    • SHA1

      5ef9985f0ebb66336125f4751c7da012582c9dd4

    • SHA256

      33c16415bb86e33f9c9b5e37a20b875df320cc40f5a1d8d7c067279f1ca04b4b

    • SHA512

      ef87c84b8d8238d8cbf58b2db4f06cabcd9f5c6471e73d5c30f877084586045dbe9ee47ac275bf59d37b66b9aa2a41809561d0aa3dcae43400c0f1537c5668c4

    • SSDEEP

      98304:CUBpeT0riOfERBGWQMYEUDPeuetEnEP4UTfGpFvMvh1u:CUBpeT0unRPQhCuMKUbGpxch1u

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks