General

  • Target

    nurjhrgbv.exe

  • Size

    3.1MB

  • Sample

    241208-zyrxnsyqbm

  • MD5

    55583e9982ac74b4e17da2004552e5da

  • SHA1

    da79fa80ff490c251c4e1b56051b86b8ab867292

  • SHA256

    19c73e461bc7f6419aa3a7bdb1c953f0ec0c28fcd08a989094673cdcd1348c39

  • SHA512

    699bcb5165b90a7ee7a591e2dc3028eb1f295cd40f6c6ed307d636fae3070b5a4e69ae7cc557d733462e33ffcaed4c3b1afd66b89eceb5479f1b0c11177de337

  • SSDEEP

    49152:rvrI22SsaNYfdPBldt698dBcjHKp61JVLoGdtuWTHHB72eh2NT:rvU22SsaNYfdPBldt6+dBcjHKpg

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

roar

C2

weopgtjkjgserhgsfd-43392.portmap.host:43392

Mutex

f8cb2dc4-1bf5-48cb-8213-fa8d6f92d388

Attributes
  • encryption_key

    C5904FDD788EA00F921C538B9FE80C0B0A0DE728

  • install_name

    roar.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    discord

  • subdirectory

    SubDir

Targets

    • Target

      nurjhrgbv.exe

    • Size

      3.1MB

    • MD5

      55583e9982ac74b4e17da2004552e5da

    • SHA1

      da79fa80ff490c251c4e1b56051b86b8ab867292

    • SHA256

      19c73e461bc7f6419aa3a7bdb1c953f0ec0c28fcd08a989094673cdcd1348c39

    • SHA512

      699bcb5165b90a7ee7a591e2dc3028eb1f295cd40f6c6ed307d636fae3070b5a4e69ae7cc557d733462e33ffcaed4c3b1afd66b89eceb5479f1b0c11177de337

    • SSDEEP

      49152:rvrI22SsaNYfdPBldt698dBcjHKp61JVLoGdtuWTHHB72eh2NT:rvU22SsaNYfdPBldt6+dBcjHKpg

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks