General

  • Target

    NiggaKernel.exe

  • Size

    3.1MB

  • Sample

    250110-fgbpksvndm

  • MD5

    0aa6ce8e774d2094a0bbc155159693be

  • SHA1

    b96b9b432b7eaee655711ca9067273275e3b86e3

  • SHA256

    0bf4aee4c471383b5acc4eb2d99123132e0cf9f36476a1edc870f8ee8eb7610a

  • SHA512

    70e1bd72be9ccce3e15245480060fc569e03cbd22b5e5282342cde401f79639c0ce9865dc2fdf032676037b7dba9ff5fbb9af5e1475bfdc81cf9a91d33b81297

  • SSDEEP

    49152:Ov+I22SsaNYfdPBldt698dBcjHfsxNESETk/iYLoGdW3THHB72eh2NT:Ovz22SsaNYfdPBldt6+dBcjHUxe2m

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

NiggaVictim

C2

TheSillyValor-36700.portmap.host:36700

Mutex

6c3995b9-837d-4aad-89fd-b25da7ae4c30

Attributes
  • encryption_key

    029FCE648CA3D58DA3A16C9A8EBE57C1E2BA129C

  • install_name

    niggakernel.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    niggakernel

  • subdirectory

    niggakernel

Targets

    • Target

      NiggaKernel.exe

    • Size

      3.1MB

    • MD5

      0aa6ce8e774d2094a0bbc155159693be

    • SHA1

      b96b9b432b7eaee655711ca9067273275e3b86e3

    • SHA256

      0bf4aee4c471383b5acc4eb2d99123132e0cf9f36476a1edc870f8ee8eb7610a

    • SHA512

      70e1bd72be9ccce3e15245480060fc569e03cbd22b5e5282342cde401f79639c0ce9865dc2fdf032676037b7dba9ff5fbb9af5e1475bfdc81cf9a91d33b81297

    • SSDEEP

      49152:Ov+I22SsaNYfdPBldt698dBcjHfsxNESETk/iYLoGdW3THHB72eh2NT:Ovz22SsaNYfdPBldt6+dBcjHUxe2m

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks