Resubmissions

28-12-2024 12:38

241228-pt81aaylhk 10

28-12-2024 12:25

241228-plre9sxqgx 10

General

  • Target

    OperaGXSetup (41).exe

  • Size

    3.8MB

  • Sample

    241228-plre9sxqgx

  • MD5

    f6a94c99deff44303f682dd2bb7d3d12

  • SHA1

    f2c6fa65a69a67a3e2120cfbb61511a495c18688

  • SHA256

    28eb5915b45f87b4ff342dbfb0122757217e79277770e9fd06a6342009c56829

  • SHA512

    16edb4c4ef94a0e19088c69a3150fc2f0e158e707eb8a4a085d7e95eecde2fbdc4bdd1afbb3fc0b13d179d2a4e60f60de14a4224a998dfb6d944dea6441ec3ec

  • SSDEEP

    49152:ZVAbwA+j3AtriaXicL8D8nqdZqb8oM28CBHmLOIt/ZwDAakqbMz3Lnn7cAWFJJL:PA+jxJIfMKmLOIt/yDh7MbLnnXWFv

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.56.1:4782

Mutex

87f91b59-5c0a-4fdb-a6da-c0d91c465167

Attributes
  • encryption_key

    2BAF13F1E7F5D90A54B973408B090D5AE355EEAE

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    EpicGames

  • subdirectory

    SubDir

Targets

    • Target

      OperaGXSetup (41).exe

    • Size

      3.8MB

    • MD5

      f6a94c99deff44303f682dd2bb7d3d12

    • SHA1

      f2c6fa65a69a67a3e2120cfbb61511a495c18688

    • SHA256

      28eb5915b45f87b4ff342dbfb0122757217e79277770e9fd06a6342009c56829

    • SHA512

      16edb4c4ef94a0e19088c69a3150fc2f0e158e707eb8a4a085d7e95eecde2fbdc4bdd1afbb3fc0b13d179d2a4e60f60de14a4224a998dfb6d944dea6441ec3ec

    • SSDEEP

      49152:ZVAbwA+j3AtriaXicL8D8nqdZqb8oM28CBHmLOIt/ZwDAakqbMz3Lnn7cAWFJJL:PA+jxJIfMKmLOIt/yDh7MbLnnXWFv

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks