General

  • Target

    273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678.exe

  • Size

    3.1MB

  • Sample

    250114-cyfs3stphy

  • MD5

    21ce4cd2ce246c86222b57b93cdc92bd

  • SHA1

    9dc24ad846b2d9db64e5bbea1977e23bb185d224

  • SHA256

    273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678

  • SHA512

    ff43fe890e30d6766f51922cfd1e9c36d312fd305620954fae8c61829f58d7361ae442bf9145339904eb6a88c2629c1e83f5b8a1d78ab0d13554cf6053d194f6

  • SSDEEP

    49152:DvTI22SsaNYfdPBldt698dBcjHZqS71J/ioGdRTTHHB72eh2NT:Dvs22SsaNYfdPBldt6+dBcjHZqSOB

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

0.tcp.in.ngrok.io:14296

Mutex

cc827307-beb6-456e-b5dd-e28a204ebd45

Attributes
  • encryption_key

    93486CAE624EBAD6626412E4A7DC6221B139DAA8

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678.exe

    • Size

      3.1MB

    • MD5

      21ce4cd2ce246c86222b57b93cdc92bd

    • SHA1

      9dc24ad846b2d9db64e5bbea1977e23bb185d224

    • SHA256

      273c917fc8fddcb94de25686720df1ea12f948dfbebffa56314b6565123ae678

    • SHA512

      ff43fe890e30d6766f51922cfd1e9c36d312fd305620954fae8c61829f58d7361ae442bf9145339904eb6a88c2629c1e83f5b8a1d78ab0d13554cf6053d194f6

    • SSDEEP

      49152:DvTI22SsaNYfdPBldt698dBcjHZqS71J/ioGdRTTHHB72eh2NT:Dvs22SsaNYfdPBldt6+dBcjHZqSOB

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks