General

  • Target

    FortniteCleaner and Spoofer.bat

  • Size

    11.7MB

  • Sample

    241230-k4gxbstqbm

  • MD5

    2633869ac4a9cb98b01488ac2cb20d72

  • SHA1

    167871fab0a19acaf7ad22144d8fdb5b09959a28

  • SHA256

    6a52f0cf77b3706de713eff3d7e038ff13d5ca7c8fc837f4eee0adac079cf522

  • SHA512

    f4d48d8e672d828c79b65b886c1ca3a423701cd6a8077c0ab78c4d2e60284ed505fc971975beab3e79bd9b9c20f821b52111258642c8bbb4024891a343004543

  • SSDEEP

    49152:z+8TuE0MoXJ8qRdxr47sbd6rBJYqfpbAgpK64KspQPEf+UWONvGFni6xha3DrNG0:k

Malware Config

Extracted

Family

quasar

Version

1.0.0.0

Botnet

v3.0.6 | Zuni

C2

infallible-water-17742.pktriot.net:22270

Mutex

35d8168c-a187-4a7a-91c1-0c08c720bf29

Attributes
  • encryption_key

    8D3F0F423E546AEF9412DC2001F9C1DAB11CB7F5

  • install_name

    .exe

  • log_directory

    $sxr-Logs

  • reconnect_delay

    3000

Targets

    • Target

      FortniteCleaner and Spoofer.bat

    • Size

      11.7MB

    • MD5

      2633869ac4a9cb98b01488ac2cb20d72

    • SHA1

      167871fab0a19acaf7ad22144d8fdb5b09959a28

    • SHA256

      6a52f0cf77b3706de713eff3d7e038ff13d5ca7c8fc837f4eee0adac079cf522

    • SHA512

      f4d48d8e672d828c79b65b886c1ca3a423701cd6a8077c0ab78c4d2e60284ed505fc971975beab3e79bd9b9c20f821b52111258642c8bbb4024891a343004543

    • SSDEEP

      49152:z+8TuE0MoXJ8qRdxr47sbd6rBJYqfpbAgpK64KspQPEf+UWONvGFni6xha3DrNG0:k

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks