General

  • Target

    Chrome.exe

  • Size

    3.1MB

  • Sample

    241211-jl7vcsykar

  • MD5

    19fd16e1d1e4025f1dcea5d29f66024f

  • SHA1

    c472e576446a8f803e60f15e7c454f8f18a402f6

  • SHA256

    88e0b988d824eab43fcc8ef79a0dae23381c1929e02cef3c82c00b3626a5c1d3

  • SHA512

    1996bbcd191f714daf4d89ff0a6730c5d407cda4387f6732aaec1aba12b06cc266845a860120ad9ef11063f947b652c37cf61dff12df2f5f076b7bb965cf88bd

  • SSDEEP

    49152:yvyI22SsaNYfdPBldt698dBcjH00+AFmzkjoGdsUTSTHHB72eh2NT:yvf22SsaNYfdPBldt6+dBcjH00+A5cU

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

chrome

C2

192.168.1.58:4782

Mutex

1d5a53de-53d3-4349-abab-ee1b0579f85f

Attributes
  • encryption_key

    56B4C4DAE2FF0461296EBCFD733DDB88E29C8E38

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      Chrome.exe

    • Size

      3.1MB

    • MD5

      19fd16e1d1e4025f1dcea5d29f66024f

    • SHA1

      c472e576446a8f803e60f15e7c454f8f18a402f6

    • SHA256

      88e0b988d824eab43fcc8ef79a0dae23381c1929e02cef3c82c00b3626a5c1d3

    • SHA512

      1996bbcd191f714daf4d89ff0a6730c5d407cda4387f6732aaec1aba12b06cc266845a860120ad9ef11063f947b652c37cf61dff12df2f5f076b7bb965cf88bd

    • SSDEEP

      49152:yvyI22SsaNYfdPBldt698dBcjH00+AFmzkjoGdsUTSTHHB72eh2NT:yvf22SsaNYfdPBldt6+dBcjH00+A5cU

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks