Resubmissions

19-12-2024 13:09

241219-qdzx4stlfy 10

18-12-2024 23:58

241218-31jwmaxpcs 10

18-12-2024 23:03

241218-21nddawjh1 7

18-12-2024 22:59

241218-2ywlzawjcs 7

18-12-2024 22:44

241218-2nva6avnfy 6

18-12-2024 22:36

241218-2h9tnawjal 6

18-12-2024 22:31

241218-2fnteavlbz 10

General

  • Target

    node-v22.11.0-x64.msi

  • Size

    28.9MB

  • Sample

    241219-qdzx4stlfy

  • MD5

    fa9e1f3064a66913362e9bff7097cef5

  • SHA1

    b34f1f9a9f6242c54486a4bc453a9336840b4425

  • SHA256

    9eea480bd30c98ae11a97cb89a9278235cbbbd03c171ee5e5198bd86b7965b4b

  • SHA512

    ad3e9469326dccac6b49185b5b2814ba700b5d83b4b3ce17f85a9adc5f90bdebf54d79800b253ed5c371ab82d27304841f86ab1a8a3c7ffade8a2d78e55dc99f

  • SSDEEP

    786432:EtShU+9S49htlhk3tKuiU9IsO9IP1/lBMS8k4:EAUK/U9IN961/l

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/robloxopensrc/robIox-cdn/raw/refs/heads/main/OneDrive.exe

Extracted

Family

quasar

Version

1.4.1

Botnet

Test

C2

147.185.221.22:54755

Mutex

9cabbafb-503b-49f1-ab22-adc756455c10

Attributes
  • encryption_key

    8B93C77AC1C58EA80A3327E9FD26246A79EF3B8E

  • install_name

    Onedrive.exe

  • log_directory

    Logs

  • reconnect_delay

    100

  • startup_key

    Microsoft OneDrive

  • subdirectory

    Onedrive

Targets

    • Target

      node-v22.11.0-x64.msi

    • Size

      28.9MB

    • MD5

      fa9e1f3064a66913362e9bff7097cef5

    • SHA1

      b34f1f9a9f6242c54486a4bc453a9336840b4425

    • SHA256

      9eea480bd30c98ae11a97cb89a9278235cbbbd03c171ee5e5198bd86b7965b4b

    • SHA512

      ad3e9469326dccac6b49185b5b2814ba700b5d83b4b3ce17f85a9adc5f90bdebf54d79800b253ed5c371ab82d27304841f86ab1a8a3c7ffade8a2d78e55dc99f

    • SSDEEP

      786432:EtShU+9S49htlhk3tKuiU9IsO9IP1/lBMS8k4:EAUK/U9IN961/l

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks