General

  • Target

    Awp.ggCRACKED.exe

  • Size

    3.1MB

  • Sample

    241219-l5tg7azmbv

  • MD5

    b622196e254ed84e5b1f59f1aac2cfb1

  • SHA1

    f77a050aaff00d2cc3da7f11fb35e0bd2c0338be

  • SHA256

    1d55a256b3519b624f19c81a9b9f0477d8ad45a967f853e723a921194ee585f0

  • SHA512

    5a525dda3785449a3770f98ce105bf83a417654537a70e6f8a4ddfcba938dffa029e11161d1ae64afed48e78e6bd3336777c97334c7c1a453e9e742506520fbf

  • SSDEEP

    49152:rvyI22SsaNYfdPBldt698dBcjHBdLf1JlaoGdVTHHB72eh2NT:rvf22SsaNYfdPBldt6+dBcjHBdLQ

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.1.19:4782

Mutex

cbd5bb11-a5b0-4dee-8e4b-bb4f3dacc71d

Attributes
  • encryption_key

    17F9A06104A1A84BB74B1E617E0D5896149A2953

  • install_name

    Solora.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Defender

  • subdirectory

    SubDir

Targets

    • Target

      Awp.ggCRACKED.exe

    • Size

      3.1MB

    • MD5

      b622196e254ed84e5b1f59f1aac2cfb1

    • SHA1

      f77a050aaff00d2cc3da7f11fb35e0bd2c0338be

    • SHA256

      1d55a256b3519b624f19c81a9b9f0477d8ad45a967f853e723a921194ee585f0

    • SHA512

      5a525dda3785449a3770f98ce105bf83a417654537a70e6f8a4ddfcba938dffa029e11161d1ae64afed48e78e6bd3336777c97334c7c1a453e9e742506520fbf

    • SSDEEP

      49152:rvyI22SsaNYfdPBldt698dBcjHBdLf1JlaoGdVTHHB72eh2NT:rvf22SsaNYfdPBldt6+dBcjHBdLQ

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks