General

  • Target

    https://github.com/quasar/Quasar

  • Sample

    241220-16sdvawlap

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

microsoft-office-365

C2

111.111.111.11:4782

Mutex

ecd2909b-2d5c-42d7-b9ca-2dc06383b25b

Attributes
  • encryption_key

    7D55309135DCD3C7F1577862EAC1BBF3B1375D2F

  • install_name

    microsoft-word.exe

  • log_directory

    key

  • reconnect_delay

    3000

  • startup_key

    microsoft-word.exe

  • subdirectory

    microsoft-office-365

Targets

    • Target

      https://github.com/quasar/Quasar

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • A potential corporate email address has been identified in the URL: currency-file@1

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks