Resubmissions

11/01/2025, 14:51

250111-r8efbstram 3

11/01/2025, 14:29

250111-rt2bjs1nct 10

General

  • Target

    lol.zip

  • Size

    4.2MB

  • Sample

    250111-rt2bjs1nct

  • MD5

    f8985e4a9a1362b5066a1b3f960af56a

  • SHA1

    02750de32ec09a9fa0a626f19b5c3e54bda0e011

  • SHA256

    c23c705943e416e750d0df38fb89f40188f0172eed163ec0d1458a993744f415

  • SHA512

    ff8e01242022a74a0ae71991db5df69b8a773a13029175447c087ea4e65869582b3f5db5739eea4247c0452483ceb9b655dd66ec7b537a1df4a2811d6210cf77

  • SSDEEP

    98304:dymoFJfIEzT2e3UYldg8cBisa3jtUlE0rQ:dgtXt3TdU5E0E

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

NMW

C2

nm111-20223.portmap.host:20223

Mutex

0cf74134-5c38-42d6-bb49-4c83c1e37344

Attributes
  • encryption_key

    F7F619EE7207F0CE79B19EAEA54D81315C5AE97B

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Exm Tweaks

  • subdirectory

    SubDir

Targets

    • Target

      lol.exe

    • Size

      4.9MB

    • MD5

      1958ebce3ce234f5bc991d75bbeac04d

    • SHA1

      a3a65a551398e3c81ecb8f4729ea4f879e018ea4

    • SHA256

      8961760a99a872da1ba6555b2eafaa8e68dfce94136156fff0651ac61275acf5

    • SHA512

      c99210237ac3135c9f75eeafe4803b129d0f7749c3960a8d127e4c28f982c8ecf61672bcf358a5f76cc02bd5cc27ca9863ed9d24ca75242db9799aa84675ac9c

    • SSDEEP

      49152:DAodtaG9kS2U84B+FLan9k5TRM9zlfVjjotfsdS2Mc1xZ9mw53PvOL7CaI4LOOEl:h/B179A2Pbn2shvit4xAhQRxGck6lh

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks