General

  • Target

    09c37ede9070103d74b3bed089dc201fc48e416af17becc806ec0f4e5ef7ef10

  • Size

    3.3MB

  • Sample

    241130-x9cwsaspbt

  • MD5

    8350e37c293e2ae2e47d6ebd5500d59f

  • SHA1

    391aab53fedd3c3425353d0042e8e3dcc3da3867

  • SHA256

    09c37ede9070103d74b3bed089dc201fc48e416af17becc806ec0f4e5ef7ef10

  • SHA512

    b71b2ba575fa296d50112c8ccfc9bf2daf294d8d62547ca7813ebbfb04d96f144aa3ad9221aa29fe5807bbb24005ebcc16a58ad9a489ba59d15bf4a09f70046a

  • SSDEEP

    49152:4vCI22SsaNYfdPBldt698dBcjHeEXpE+LVk/tMeoGdVTHHB72eh2NTiwD:4vP22SsaNYfdPBldt6+dBcjHeEXa5NG

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

deoxyz

C2

deoxyz1234-43577.portmap.host:43577

Mutex

ab79c5b4-561c-4221-9d19-8127b03be663

Attributes
  • encryption_key

    71BF3C0F14270AD8DDE655D1E8D71855D54DDD5B

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    System

  • subdirectory

    SubDir

Targets

    • Target

      09c37ede9070103d74b3bed089dc201fc48e416af17becc806ec0f4e5ef7ef10

    • Size

      3.3MB

    • MD5

      8350e37c293e2ae2e47d6ebd5500d59f

    • SHA1

      391aab53fedd3c3425353d0042e8e3dcc3da3867

    • SHA256

      09c37ede9070103d74b3bed089dc201fc48e416af17becc806ec0f4e5ef7ef10

    • SHA512

      b71b2ba575fa296d50112c8ccfc9bf2daf294d8d62547ca7813ebbfb04d96f144aa3ad9221aa29fe5807bbb24005ebcc16a58ad9a489ba59d15bf4a09f70046a

    • SSDEEP

      49152:4vCI22SsaNYfdPBldt698dBcjHeEXpE+LVk/tMeoGdVTHHB72eh2NTiwD:4vP22SsaNYfdPBldt6+dBcjHeEXa5NG

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks