General

  • Target

    t.cmd

  • Size

    1KB

  • Sample

    250102-k8azksvpav

  • MD5

    c3a80dbc5b98aac01cc124b59ec52d7e

  • SHA1

    eae4d2a89be841042839e8bfeca7480a2ba327e4

  • SHA256

    4d5a2a643cdab50f0105e110a8187cd812a7ebbc7d903b8a8029cd3508094f32

  • SHA512

    addf559ed04d9cbaccdc25d87940c0c0af41e183087c9c956bab438b7cf755a7481aa88d534792c265ace9491302ae81343de77d4c93101a232d44d47500d5a9

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://i.imghippo.com/files/Zf9637kKg.jpg

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://i.imghippo.com/files/tBJo2822HAE.jpg

Extracted

Family

quasar

Version

1.4.1

Botnet

new

C2

194.26.192.167:2768

Mutex

67b58d78-e769-403e-bf6e-e83f8f31b2f5

Attributes
  • encryption_key

    BE2B0B270E4DB19CAA5C42E9D2EBF64645A2D055

  • install_name

    OneDrive.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    OneDrive

  • subdirectory

    OneDrive

Targets

    • Target

      t.cmd

    • Size

      1KB

    • MD5

      c3a80dbc5b98aac01cc124b59ec52d7e

    • SHA1

      eae4d2a89be841042839e8bfeca7480a2ba327e4

    • SHA256

      4d5a2a643cdab50f0105e110a8187cd812a7ebbc7d903b8a8029cd3508094f32

    • SHA512

      addf559ed04d9cbaccdc25d87940c0c0af41e183087c9c956bab438b7cf755a7481aa88d534792c265ace9491302ae81343de77d4c93101a232d44d47500d5a9

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks