General

  • Target

    2787d416bf228915debc5d9c9e058cc246f8da7217c706d8a1fe0cb788a9155b.exe

  • Size

    3.1MB

  • Sample

    250121-cyzwys1rey

  • MD5

    aad11067aa90b9d96958aae378c45747

  • SHA1

    13dc757a06a092ab0ef34482c307604a67fd74b9

  • SHA256

    2787d416bf228915debc5d9c9e058cc246f8da7217c706d8a1fe0cb788a9155b

  • SHA512

    8a2fc9cfc72b7f9fb0ff54292022d738013813f222ebe3d7e54f1d916a6307d7652a5f4276d38550e6c515e637358b039a3f784e70a187e2d754b60eaff26813

  • SSDEEP

    49152:gvXhBYjCOuDt2d5aKCuVPzlEmVQL0wvwkaE8sV4mzFEoGdCTHHB72eh2NT:gvdt2d5aKCuVPzlEmVQ0wvwfJsVo

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

VM-KU

C2

adidya354-21806.portmap.host:21806

Mutex

cf7c4d30-a326-47cc-a5f0-5a19aa014204

Attributes
  • encryption_key

    E50BC33BC56B70B1A2963DE6EA1855A0E0D0FBCE

  • install_name

    Windows Shell Interactive.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows Shell Interactive

Targets

    • Target

      2787d416bf228915debc5d9c9e058cc246f8da7217c706d8a1fe0cb788a9155b.exe

    • Size

      3.1MB

    • MD5

      aad11067aa90b9d96958aae378c45747

    • SHA1

      13dc757a06a092ab0ef34482c307604a67fd74b9

    • SHA256

      2787d416bf228915debc5d9c9e058cc246f8da7217c706d8a1fe0cb788a9155b

    • SHA512

      8a2fc9cfc72b7f9fb0ff54292022d738013813f222ebe3d7e54f1d916a6307d7652a5f4276d38550e6c515e637358b039a3f784e70a187e2d754b60eaff26813

    • SSDEEP

      49152:gvXhBYjCOuDt2d5aKCuVPzlEmVQL0wvwkaE8sV4mzFEoGdCTHHB72eh2NT:gvdt2d5aKCuVPzlEmVQ0wvwfJsVo

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks