Analysis

  • max time kernel
    95s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-12-2024 06:37

General

  • Target

    d0d221d0a152430a62531fd46b7c1f43721110da2bb3ee2f5688e484b143aceb.exe

  • Size

    5.6MB

  • MD5

    c549fe02bb65c0c2977c741c7ed4fd80

  • SHA1

    8475e459ba2fe572c53b08c061a5b24e074832a1

  • SHA256

    d0d221d0a152430a62531fd46b7c1f43721110da2bb3ee2f5688e484b143aceb

  • SHA512

    b51e81d073dc1bbdeea1f0dcf66901f2996faa5f30657e354c0c9271ad0f58ce0cc20744f8287afd81904d10148032038f2bad33e45d49685f7dce73e0a52b3a

  • SSDEEP

    98304:fC0lmUrXmOH9wShg7JrBAwbzWMaA/BcV6LoFU4:flmUjY/rHKAL4U4

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

NEURO

C2

51.15.17.193:4782

Mutex

1f6c9ecc-c030-43a4-bbf2-21326400cbb5

Attributes
  • encryption_key

    97599F6E5D14A784CC4DD36B18A277119042FDA8

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d0d221d0a152430a62531fd46b7c1f43721110da2bb3ee2f5688e484b143aceb.exe
    "C:\Users\Admin\AppData\Local\Temp\d0d221d0a152430a62531fd46b7c1f43721110da2bb3ee2f5688e484b143aceb.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4116

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4116-0-0x00007FFEED693000-0x00007FFEED695000-memory.dmp

    Filesize

    8KB

  • memory/4116-1-0x00000193B69E0000-0x00000193B6D04000-memory.dmp

    Filesize

    3.1MB

  • memory/4116-2-0x00007FFEED690000-0x00007FFEEE151000-memory.dmp

    Filesize

    10.8MB

  • memory/4116-3-0x00007FFEED690000-0x00007FFEEE151000-memory.dmp

    Filesize

    10.8MB

  • memory/4116-4-0x00000193B6400000-0x00000193B6450000-memory.dmp

    Filesize

    320KB

  • memory/4116-5-0x00000193B7240000-0x00000193B72F2000-memory.dmp

    Filesize

    712KB

  • memory/4116-8-0x00000193B6470000-0x00000193B6482000-memory.dmp

    Filesize

    72KB

  • memory/4116-9-0x00000193B6E90000-0x00000193B6ECC000-memory.dmp

    Filesize

    240KB

  • memory/4116-10-0x00007FFEED693000-0x00007FFEED695000-memory.dmp

    Filesize

    8KB

  • memory/4116-11-0x00007FFEED690000-0x00007FFEEE151000-memory.dmp

    Filesize

    10.8MB

  • memory/4116-12-0x00007FFEED690000-0x00007FFEEE151000-memory.dmp

    Filesize

    10.8MB