General

  • Target

    1556f5c6d156be7f16a8ca03e06a2e86d81d4ad52c371219ba6fe6d588f28217

  • Size

    858KB

  • Sample

    250123-chfs5sxqbj

  • MD5

    81c903bf6c6adda5f374876e8460a2e6

  • SHA1

    591a1855a57c22b53e64f1d508a0632ef2f00828

  • SHA256

    1556f5c6d156be7f16a8ca03e06a2e86d81d4ad52c371219ba6fe6d588f28217

  • SHA512

    9e239d192a3bca873a582636ba3df51537f238a75106e836debfd40942a68b78495a2babf74475452950fafc82f717a4696d2d5ddf0e7b92a151bdc8b3727517

  • SSDEEP

    12288:7SkUEyq0tJpRGerwMI2HSmPRcvfawb6JPOiH:+kUEy9RGe0F2ypfn6JPO

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Botnet 4.2

C2

myowndomain394863467.com:80

2.56.213.169:80

Mutex

kq7jVCudi9RxxqT976

Attributes
  • encryption_key

    TDyLsJ9jM1rI6kCJGkYI

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Extracted

Family

redline

Botnet

KMSpico

C2

2.56.213.169:6441

Attributes
  • auth_value

    31972fd5af1a03641abaf28a521a2935

Targets

    • Target

      1556f5c6d156be7f16a8ca03e06a2e86d81d4ad52c371219ba6fe6d588f28217

    • Size

      858KB

    • MD5

      81c903bf6c6adda5f374876e8460a2e6

    • SHA1

      591a1855a57c22b53e64f1d508a0632ef2f00828

    • SHA256

      1556f5c6d156be7f16a8ca03e06a2e86d81d4ad52c371219ba6fe6d588f28217

    • SHA512

      9e239d192a3bca873a582636ba3df51537f238a75106e836debfd40942a68b78495a2babf74475452950fafc82f717a4696d2d5ddf0e7b92a151bdc8b3727517

    • SSDEEP

      12288:7SkUEyq0tJpRGerwMI2HSmPRcvfawb6JPOiH:+kUEy9RGe0F2ypfn6JPO

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Creates new service(s)

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Uses the VBS compiler for execution

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks