General

  • Target

    12d3a5848962353e0799964d9774bbbbf63c8d77a924f3cc14df49039c2ecb73

  • Size

    348KB

  • Sample

    250109-y6d54szmhz

  • MD5

    222eb2520861357489b7a11a99656e3f

  • SHA1

    fb21802a64e6bbc3a9746e5ee5e4f92c2dc8bfcf

  • SHA256

    12d3a5848962353e0799964d9774bbbbf63c8d77a924f3cc14df49039c2ecb73

  • SHA512

    991d90dda45c324e4b15a3cf3d0f5209d2f71c4d3145169215737c448d8ce0da494f32a2187e5bddb4eac488a48e18b061ff7bd42d1a28458e472359af798ecb

  • SSDEEP

    6144:+V6bPXhLApfpUw4qCgafQbX30nlIHh/m7vHdjz7iO:umhAp6lqKfq0GheLHd/iO

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

ForceOP

C2

jordiek1d.ddns.net:4782

Mutex

QSR_MUTEX_Y1VQAwHslXRVvQkGHj

Attributes
  • encryption_key

    3xJFlGvSDHRDtYnPg0qe

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    WindowsDrivers

  • subdirectory

    SubDir

Targets

    • Target

      12d3a5848962353e0799964d9774bbbbf63c8d77a924f3cc14df49039c2ecb73

    • Size

      348KB

    • MD5

      222eb2520861357489b7a11a99656e3f

    • SHA1

      fb21802a64e6bbc3a9746e5ee5e4f92c2dc8bfcf

    • SHA256

      12d3a5848962353e0799964d9774bbbbf63c8d77a924f3cc14df49039c2ecb73

    • SHA512

      991d90dda45c324e4b15a3cf3d0f5209d2f71c4d3145169215737c448d8ce0da494f32a2187e5bddb4eac488a48e18b061ff7bd42d1a28458e472359af798ecb

    • SSDEEP

      6144:+V6bPXhLApfpUw4qCgafQbX30nlIHh/m7vHdjz7iO:umhAp6lqKfq0GheLHd/iO

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks