General

  • Target

    CrackedRobux.exe

  • Size

    3.1MB

  • Sample

    250103-lk3v5axlht

  • MD5

    8158cd95de55261b19c72cb007682a97

  • SHA1

    f3defde044bf5805ee824bed29c12507257bed86

  • SHA256

    aae17c6e16a9840145c5573a06e39a49c000d13aef62a8cadc11bd6b23729ec7

  • SHA512

    c0c1c5b917ff444cf4a7c06ace209831e15a86a91354e3e8f93a7842c3b2f9cbb6867769bf522799c1f8465fd95b038dc7d62c70c3258f076d0b9c30606792fc

  • SSDEEP

    49152:LvzlL26AaNeWgPhlmVqvMQ7XSKyCq1JnhoGdWwTHHB72eh2NT:LvpL26AaNeWgPhlmVqkQ7XSKyCUm

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.1.1:4782

Mutex

2e4e5ad5-7396-46f0-ad6e-e30b507d18ec

Attributes
  • encryption_key

    F4281B728FFBFD53624BD49C44B446D5CE9BE200

  • install_name

    CrackedRobux.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Calculator

  • subdirectory

    SubDir

Targets

    • Target

      CrackedRobux.exe

    • Size

      3.1MB

    • MD5

      8158cd95de55261b19c72cb007682a97

    • SHA1

      f3defde044bf5805ee824bed29c12507257bed86

    • SHA256

      aae17c6e16a9840145c5573a06e39a49c000d13aef62a8cadc11bd6b23729ec7

    • SHA512

      c0c1c5b917ff444cf4a7c06ace209831e15a86a91354e3e8f93a7842c3b2f9cbb6867769bf522799c1f8465fd95b038dc7d62c70c3258f076d0b9c30606792fc

    • SSDEEP

      49152:LvzlL26AaNeWgPhlmVqvMQ7XSKyCq1JnhoGdWwTHHB72eh2NT:LvpL26AaNeWgPhlmVqkQ7XSKyCUm

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks