Resubmissions

09-01-2025 21:48

250109-1n5lfsskf1 10

09-01-2025 21:32

250109-1dl2cstnhr 10

General

  • Target

    Tiny v0.2.7z

  • Size

    242KB

  • Sample

    250109-1n5lfsskf1

  • MD5

    e8c520acf2c2aafab855cb020bdd6ecc

  • SHA1

    004f026a0df17fc5baa71b03ed388b8d3e48d230

  • SHA256

    b497ae4e48e97c04cebe2d1951472e0fdcb46b24d7ed7083a7571ecc3ac24f9d

  • SHA512

    11d72746ff41b91ba51a15f817b568af784bf8642dfacbf85e2cba0ad7d88b4f8737c898b1c57cd3ef2584f7cbedf520214a1c4ab42bfae7143e554ea0c2afa1

  • SSDEEP

    6144:jziVGaB36IAuHLpzYjtLvVvIvUPwwXpz12yLvV:PiV3NkjtZvIrwJDV

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

127.0.0.1:4782

10.127.0.76:4782

Mutex

ceba77cb-5567-4824-ba5e-16e6d3ca4208

Attributes
  • encryption_key

    0591A3DAA36367C7A85F2C51B6163217E1AA3AF0

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      Tiny v0.2/Tiny.exe

    • Size

      618KB

    • MD5

      b9f7f125066c414f71fb9b805879a4cf

    • SHA1

      e7a5ea344304f289029d031b012a680b689aa7d1

    • SHA256

      d944181cf3c1dc7b02d30d4802d491a99f42a181446ce1be7710724541210c7d

    • SHA512

      4bd845189e56aaa0ff55a321372ff7b3ab6cf68a272787371c014f70831eca56d6b03365a4f8589b1f3b55a083c8d908e9cb9f6167ac868113354d9ca436433f

    • SSDEEP

      12288:ILEddxz9C1r0twaY0lmJZdwA8mRARNC+y9ErlfSu:KE/XFA4pAARNCvulfSu

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks