General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
241217-hanfxasrds
-
MD5
cf049d1ba0fceeb5348f71e15889fbc4
-
SHA1
94cc88586240456f777aed403d955027555db8d1
-
SHA256
41bd24fe8b67e9e3cd5bb272a07640de345c39f6cb6c4057491838de95dac6d7
-
SHA512
2e7a7d3415164cb453193fdceef02d46c35f9103521b33bc424c9b79659fac2e4b9deb0fe8754f0842546b51403181032b6c7a05116adfc4f2b8fd599c3ad6ed
-
SSDEEP
49152:avelL26AaNeWgPhlmVqvMQ7XSKIxOEMkek/JxwoGdeTHHB72eh2NT:avOL26AaNeWgPhlmVqkQ7XSKIxty
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.4.1
RAT 5 (EPIC VERISON)
serveo.net:11453
7a1301f7-dc6f-4847-a8ee-ca627a9efa0f
-
encryption_key
3B793156AD6D884F51309D0E992DAA75D03D2783
-
install_name
Application Frame Host.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Microsoft
-
subdirectory
SubDir
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
cf049d1ba0fceeb5348f71e15889fbc4
-
SHA1
94cc88586240456f777aed403d955027555db8d1
-
SHA256
41bd24fe8b67e9e3cd5bb272a07640de345c39f6cb6c4057491838de95dac6d7
-
SHA512
2e7a7d3415164cb453193fdceef02d46c35f9103521b33bc424c9b79659fac2e4b9deb0fe8754f0842546b51403181032b6c7a05116adfc4f2b8fd599c3ad6ed
-
SSDEEP
49152:avelL26AaNeWgPhlmVqvMQ7XSKIxOEMkek/JxwoGdeTHHB72eh2NT:avOL26AaNeWgPhlmVqkQ7XSKIxty
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1