General

  • Target

    Client-built.exe

  • Size

    3.1MB

  • Sample

    241222-ecd4gasnem

  • MD5

    06852863597eb1bd83b37bb3b41c98d5

  • SHA1

    d11647b959e42ea8d5faa39db64410e529935176

  • SHA256

    a46695be041bc840e85bfe04c10149437ebf8a756aa1a000e8cb27b99b88eb74

  • SHA512

    9cecea8664556ba436b6e8d6d1b5fdcd6bb72a86ab6d697f663fe6f215e4fe0bf3e4b893fa88a5495fdd814e4567348cd2c92564894f1d6914b54b9de8060c6c

  • SSDEEP

    49152:WvbI22SsaNYfdPBldt698dBcjHts9qBbR0LoGdYCTHHB72eh2NT:Wvk22SsaNYfdPBldt6+dBcjHtSqi

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

172.19.176.1:4782

Mutex

5ff21f42-29bb-4f39-8330-d7b25899e244

Attributes
  • encryption_key

    5FA29404115DC34E66E4C1BC971398B0B301D072

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Extracted

Family

quasar

Version

1.4.0

Botnet

v15.4.1 | Venom

C2

dofucks.com:12482

private115.duckdns.org:12482

Mutex

adf10731-c83d-4166-9137-39d0b1e48856

Attributes
  • encryption_key

    C84CB6134701741C5122A14FACDB67C8CFA9C0AB

  • install_name

    .exe

  • log_directory

    $sxr-Logs

  • reconnect_delay

    3000

  • startup_key

    $sxr-seroxen

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

127.0.0.1:4449

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    true

  • install_file

    ezez.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Client-built.exe

    • Size

      3.1MB

    • MD5

      06852863597eb1bd83b37bb3b41c98d5

    • SHA1

      d11647b959e42ea8d5faa39db64410e529935176

    • SHA256

      a46695be041bc840e85bfe04c10149437ebf8a756aa1a000e8cb27b99b88eb74

    • SHA512

      9cecea8664556ba436b6e8d6d1b5fdcd6bb72a86ab6d697f663fe6f215e4fe0bf3e4b893fa88a5495fdd814e4567348cd2c92564894f1d6914b54b9de8060c6c

    • SSDEEP

      49152:WvbI22SsaNYfdPBldt698dBcjHts9qBbR0LoGdYCTHHB72eh2NT:Wvk22SsaNYfdPBldt6+dBcjHtSqi

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks