General

  • Target

    Nemoxen.exe

  • Size

    676KB

  • Sample

    241129-thh2yatrf1

  • MD5

    0af0a6cf3d6aa2d46cddbe43bc543e3c

  • SHA1

    b6626edb5a410a7e8fb054d77e9ae77e0bbb92ce

  • SHA256

    435a89b57a238ca9ac57a93519017010d9cb1ced152cb4a51defd9b429314021

  • SHA512

    37c860181269f4233cd3ecdb77b77ec336fb95f5e6c845f8a09c1c126bda3fa06806f69d095fa837642597ac672cb6b8dd113ffac319601cf345248d89b859c3

  • SSDEEP

    12288:zTEgdfYwbgf9Ip94Iyw4XpRJj0YDlRcdN+8:MUwzyRyw4XpRh0Qcdo8

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

Neoxen

C2

192.168.0.42:4782

192.168.56.1:4782

Mutex

5e5c2635-6e73-4945-84d1-6fff2a604503

Attributes
  • encryption_key

    4D634613C08A5953B861CE48D768ABEFCD1484A3

  • install_name

    coolpro12.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Neoxen

  • subdirectory

    SubDir

Targets

    • Target

      Nemoxen.exe

    • Size

      676KB

    • MD5

      0af0a6cf3d6aa2d46cddbe43bc543e3c

    • SHA1

      b6626edb5a410a7e8fb054d77e9ae77e0bbb92ce

    • SHA256

      435a89b57a238ca9ac57a93519017010d9cb1ced152cb4a51defd9b429314021

    • SHA512

      37c860181269f4233cd3ecdb77b77ec336fb95f5e6c845f8a09c1c126bda3fa06806f69d095fa837642597ac672cb6b8dd113ffac319601cf345248d89b859c3

    • SSDEEP

      12288:zTEgdfYwbgf9Ip94Iyw4XpRJj0YDlRcdN+8:MUwzyRyw4XpRh0Qcdo8

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks