General

  • Target

    testingfile.exe

  • Size

    3.1MB

  • Sample

    241213-l55v8avmat

  • MD5

    4489c3282400ad9e96ea5ca7c28e6369

  • SHA1

    91a2016778cce0e880636d236efca38cf0a7713d

  • SHA256

    cc68b1903e22d22e6f0a29bcdf46825d5c57747d8eb3a75672a4d6930f60fe77

  • SHA512

    adaeab8aa666057ff008e86f96ae6b9a36ff2f276fdd49f6663c300357f3dc10f59fac7700bb385aa35887918a830e18bddaa41b3305d913566f58aa428a72b0

  • SSDEEP

    49152:fvmI22SsaNYfdPBldt698dBcjH+ixNESEtk/i/LoGdCUTHHB72eh2NT:fvr22SsaNYfdPBldt6+dBcjHTx0D

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

testinghigger-42471.portmap.host:42471

Mutex

7a5f2afa-38ce-4bed-8e42-d1108199a2b3

Attributes
  • encryption_key

    0F8B61E5223AD57FA54A04631691138A0F76FAE4

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    wod2

  • subdirectory

    SubDir

Targets

    • Target

      testingfile.exe

    • Size

      3.1MB

    • MD5

      4489c3282400ad9e96ea5ca7c28e6369

    • SHA1

      91a2016778cce0e880636d236efca38cf0a7713d

    • SHA256

      cc68b1903e22d22e6f0a29bcdf46825d5c57747d8eb3a75672a4d6930f60fe77

    • SHA512

      adaeab8aa666057ff008e86f96ae6b9a36ff2f276fdd49f6663c300357f3dc10f59fac7700bb385aa35887918a830e18bddaa41b3305d913566f58aa428a72b0

    • SSDEEP

      49152:fvmI22SsaNYfdPBldt698dBcjH+ixNESEtk/i/LoGdCUTHHB72eh2NT:fvr22SsaNYfdPBldt6+dBcjHTx0D

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks