General

  • Target

    c63218f9ea9fcd899216ecf7f802c4c7c94c633d8c404ecf9be30adbdee00e5f

  • Size

    3.6MB

  • Sample

    241203-ktrzjsxrgs

  • MD5

    588611722edba47986505c9e9234de19

  • SHA1

    4ff6ffe18edca69cf8673ca91f6bfc8fb1a050a5

  • SHA256

    c63218f9ea9fcd899216ecf7f802c4c7c94c633d8c404ecf9be30adbdee00e5f

  • SHA512

    84c03cfe1d29827027e3096c1c213e9244dba7f5e76c5b9e921e1a1f22f5a23bca8337c45fc6b9bb84c622323bd75d5a6259afb6a164305644fd2068e9f70c86

  • SSDEEP

    49152:z6K3X67d1TXH2/yi4VsKLVo7VYH8tOVQPkWpGe28sFqklOksXbWWzhP0aCJW3kCz:z6Kn67LG6F+ZYAOOVzsFqkEvuaCSqIj

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

DAVID

C2

hoffmann3.ydns.eu:5829

Mutex

532aca2b-96ff-44aa-9213-031e975919ac

Attributes
  • encryption_key

    C5B555A83D127A9553D4FB1FCECB35CE8E91A447

  • install_name

    outlooks.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Outlooks

  • subdirectory

    WindowsUpdates

Targets

    • Target

      Zamówienie - 021224 - 901003637.com

    • Size

      3.7MB

    • MD5

      15f259b30ec72a5217144834f7f5b564

    • SHA1

      baed3fe7d059a497f856e263431ccd3872ef1ea1

    • SHA256

      01de053d9560d419f0b6c35dbddb1175eb1fd7a21450989332024b812d39c4c2

    • SHA512

      5e1148a9cf8008b7c38d067ec34e5c3bc7255341d114476532f8111ea2c3e654eb70b0a439aaaea22543576f09b9cec269f9b3414a6a24fc54b89c7c677c5f47

    • SSDEEP

      98304:ZrAsTIZbqqBQjwske/pCT66UNYekeWY0CE9:ZcCSL0ke/pO5ekeWtCE9

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks