General

  • Target

    Panel Ejecutador MTA 3.14.exe

  • Size

    3.3MB

  • Sample

    241201-k5fewstmam

  • MD5

    5791d405ca0a97a89eeaeb4f2be628be

  • SHA1

    a012d40aaaa01db12a83b0e4408d012fd383dd0b

  • SHA256

    6c67a1bf1d558b31a790e4bdcef062c9b49f00a1b3d7361dfc8308d55b87bc5d

  • SHA512

    3971447d6a5f1ffe51bb1acc0d2525aa5bca521358c67828e6bd983d68e8c22dfa83ab49109575bc113e13de861682af563a3ed21e5ef48cce1bfcdb8f1f2afd

  • SSDEEP

    49152:ovSI22SsaNYfdPBldt698dBcjH3xcEf8Kk/Ja1oGd58THHB72eh2NT:ov/22SsaNYfdPBldt6+dBcjH3xa8

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

azxq0ap.localto.net:3425

Mutex

e51e2b65-e963-4051-9736-67d57ed46798

Attributes
  • encryption_key

    AEA258EF65BF1786F0F767C0BE2497ECC304C46F

  • install_name

    WindowsUpdate.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    WindowsUpdate

  • subdirectory

    SubDir

Targets

    • Target

      Panel Ejecutador MTA 3.14.exe

    • Size

      3.3MB

    • MD5

      5791d405ca0a97a89eeaeb4f2be628be

    • SHA1

      a012d40aaaa01db12a83b0e4408d012fd383dd0b

    • SHA256

      6c67a1bf1d558b31a790e4bdcef062c9b49f00a1b3d7361dfc8308d55b87bc5d

    • SHA512

      3971447d6a5f1ffe51bb1acc0d2525aa5bca521358c67828e6bd983d68e8c22dfa83ab49109575bc113e13de861682af563a3ed21e5ef48cce1bfcdb8f1f2afd

    • SSDEEP

      49152:ovSI22SsaNYfdPBldt698dBcjH3xcEf8Kk/Ja1oGd58THHB72eh2NT:ov/22SsaNYfdPBldt6+dBcjH3xa8

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks