General

  • Target

    68146c839c7f9796c8cf176d42c08f43c6a5233bbe0c20254251049b90973257

  • Size

    2.0MB

  • Sample

    241210-3fxa8avlbs

  • MD5

    4ea7103214b50d185fa6d3ba4df3bb17

  • SHA1

    d1043763a20561ae4b13398902c56bf1acc581f9

  • SHA256

    68146c839c7f9796c8cf176d42c08f43c6a5233bbe0c20254251049b90973257

  • SHA512

    1881b8161a18aa65c4521edfa07f7d3d0982743237e18d24e6283b3eac7075701cc62fb9280887bf10a608c122cfa308acf5a88fc8fcc72ab9c0749a0feb9210

  • SSDEEP

    24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKY9:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Y7

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

EbayProfiles

C2

5.8.88.191:443

sockartek.icu:443

Mutex

QSR_MUTEX_0kBRNrRz5TDLEQouI0

Attributes
  • encryption_key

    MWhG6wsClMX8aJM2CVXT

  • install_name

    winsock.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    win defender run

  • subdirectory

    SubDir

Extracted

Family

azorult

C2

http://0x21.in:8000/_az/

Targets

    • Target

      68146c839c7f9796c8cf176d42c08f43c6a5233bbe0c20254251049b90973257

    • Size

      2.0MB

    • MD5

      4ea7103214b50d185fa6d3ba4df3bb17

    • SHA1

      d1043763a20561ae4b13398902c56bf1acc581f9

    • SHA256

      68146c839c7f9796c8cf176d42c08f43c6a5233bbe0c20254251049b90973257

    • SHA512

      1881b8161a18aa65c4521edfa07f7d3d0982743237e18d24e6283b3eac7075701cc62fb9280887bf10a608c122cfa308acf5a88fc8fcc72ab9c0749a0feb9210

    • SSDEEP

      24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKY9:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Y7

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.