General

  • Target

    ebded901ad7a09d103339a55c71092e92a0ce60f28309e219699bad267abe69d

  • Size

    3.1MB

  • Sample

    241130-fxlvgstqhz

  • MD5

    0acba184a7a39e8a01dccac492b5b0a2

  • SHA1

    9dd9dff8cc9b44106d1eee6e2609c4ad120d8832

  • SHA256

    ebded901ad7a09d103339a55c71092e92a0ce60f28309e219699bad267abe69d

  • SHA512

    c3f03e64849b2f29fd8f6d222d9fbec772fa02fe78e54eb26723e335d82e609910c5246fda2f83fcfa1dc8190f553e0f09f6d8bd0f05670ec1ee5def6bec59fe

  • SSDEEP

    49152:Kvlt62XlaSFNWPjljiFa2RoUYIERdhdHoGdA0THHB72eh2NT:KvX62XlaSFNWPjljiFXRoUYIERdhx

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

10.0.2.0:4782

Mutex

33c681d1-8b12-4911-ba22-fb14fc44f47b

Attributes
  • encryption_key

    EBF46976BE5CDF107B1DE0A2CC45E1DA40BFA827

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      ebded901ad7a09d103339a55c71092e92a0ce60f28309e219699bad267abe69d

    • Size

      3.1MB

    • MD5

      0acba184a7a39e8a01dccac492b5b0a2

    • SHA1

      9dd9dff8cc9b44106d1eee6e2609c4ad120d8832

    • SHA256

      ebded901ad7a09d103339a55c71092e92a0ce60f28309e219699bad267abe69d

    • SHA512

      c3f03e64849b2f29fd8f6d222d9fbec772fa02fe78e54eb26723e335d82e609910c5246fda2f83fcfa1dc8190f553e0f09f6d8bd0f05670ec1ee5def6bec59fe

    • SSDEEP

      49152:Kvlt62XlaSFNWPjljiFa2RoUYIERdhdHoGdA0THHB72eh2NT:KvX62XlaSFNWPjljiFXRoUYIERdhx

MITRE ATT&CK Enterprise v15

Tasks