General

  • Target

    Update.exe

  • Size

    413KB

  • Sample

    250117-zp3mtatkhj

  • MD5

    d0564fc7770410d9c9efddfe4318fe40

  • SHA1

    70e9c65c95ef79a8fb412d4b5baa747be19f358f

  • SHA256

    926ca6246cafb2f73a2a44325a1c2c9a5e136f109cf5fc1beecfe2611adc95e8

  • SHA512

    0dbad5c423b060dc3122c8b1d351e6fd519526de74ff01c17997e05ec88b91cb2c9e9267ed406f0f652cd82c788318ca671e7bf6fc6b4b810f780a04521bc37d

  • SSDEEP

    12288:t1TVVfbfGyO2NHb64vVEWiFjwqLlShatH1GK:9NeyO2NHb64vVEZjbLlS0D

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

Office04

C2

217.254.98.158:4782

Mutex

$Sxr-0AJKEcQg2SeZyXPT01

Attributes
  • encryption_key

    YCpmQrQIUT3FKePhT9Ax

  • install_name

    rat_client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    SeroXen Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      Update.exe

    • Size

      413KB

    • MD5

      d0564fc7770410d9c9efddfe4318fe40

    • SHA1

      70e9c65c95ef79a8fb412d4b5baa747be19f358f

    • SHA256

      926ca6246cafb2f73a2a44325a1c2c9a5e136f109cf5fc1beecfe2611adc95e8

    • SHA512

      0dbad5c423b060dc3122c8b1d351e6fd519526de74ff01c17997e05ec88b91cb2c9e9267ed406f0f652cd82c788318ca671e7bf6fc6b4b810f780a04521bc37d

    • SSDEEP

      12288:t1TVVfbfGyO2NHb64vVEWiFjwqLlShatH1GK:9NeyO2NHb64vVEZjbLlS0D

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks