General
-
Target
https://discord.com
-
Sample
241206-f64fwssmb1
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://discord.com
Resource
win11-20241007-en
windows11-21h2-x64
34 signatures
300 seconds
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
Office04
C2
azxq0ap.localto.net:3425
Mutex
e51e2b65-e963-4051-9736-67d57ed46798
Attributes
-
encryption_key
AEA258EF65BF1786F0F767C0BE2497ECC304C46F
-
install_name
WindowsUpdate.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
WindowsUpdate
-
subdirectory
SubDir
Targets
-
-
Target
https://discord.com
-
Quasar family
-
Quasar payload
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: 6633dd5dcff475e6fb744426_&@2x.png
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1