Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2024 20:51

General

  • Target

    57caa771cdc49a089b783f3df4e72f99.exe

  • Size

    3.1MB

  • MD5

    57caa771cdc49a089b783f3df4e72f99

  • SHA1

    94609144f4752e594e6f569f05cea5c2f80473e0

  • SHA256

    23d78defb24bc7e2496d016a368054df8f7f9b64988ffcba00dab9311b7329d4

  • SHA512

    f145321b4bf217ae71855a86619faf8f17ae8f3f1f13f4611f5e7809cba5c1fe71185d8227897fb7f83741b2cc348792ae918e45d98e9c0d647dcc0f7e3ea2f0

  • SSDEEP

    49152:CvWI22SsaNYfdPBldt698dBcjHM9RJ6DbR3LoGdRVTHHB72eh2NT:Cv722SsaNYfdPBldt6+dBcjHM9RJ61B

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

7332

C2

149.50.108.116:7332

Mutex

41fce632-c870-4911-98d8-32bfb4cb74f3

Attributes
  • encryption_key

    5F29C07D7CDED6776D9E269C35195B7318EC31BE

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57caa771cdc49a089b783f3df4e72f99.exe
    "C:\Users\Admin\AppData\Local\Temp\57caa771cdc49a089b783f3df4e72f99.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2640

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2640-0-0x000007FEF5DF3000-0x000007FEF5DF4000-memory.dmp

    Filesize

    4KB

  • memory/2640-1-0x0000000000370000-0x0000000000694000-memory.dmp

    Filesize

    3.1MB

  • memory/2640-2-0x000007FEF5DF0000-0x000007FEF67DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2640-3-0x000007FEF5DF3000-0x000007FEF5DF4000-memory.dmp

    Filesize

    4KB

  • memory/2640-4-0x000007FEF5DF0000-0x000007FEF67DC000-memory.dmp

    Filesize

    9.9MB