General
Static task
static1
URLScan task
urlscan1
Malware Config
Extracted
quasar
1.4.1
Office04
10.127.0.48:4782
9b225906-1617-49ef-bb3a-e8f6ef2a81c1
-
encryption_key
1B774F3185F3A42FCDB51EF7371C864A93FF4A01
-
install_name
Chrome.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Google Chrome
-
subdirectory
Google
Extracted
quasar
1.4.1
sfdih
10.127.0.48:4782
7c2c56df-01fe-4a99-8343-64e9423c0c42
-
encryption_key
1B774F3185F3A42FCDB51EF7371C864A93FF4A01
-
install_name
Chrome.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Google Chrome
-
subdirectory
Google
Targets
-
-
Target
http://openvpn.net/client
-
Quasar family
-
Quasar payload
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1