General

  • Target

    7a0e6de0fc707e6410bd8fb8e15f7b96d76df332d016ef9e0b6311b0991e6909

  • Size

    3.5MB

  • Sample

    250128-r5qzysvmdm

  • MD5

    236ba43afb065e9acaac901ffad3814c

  • SHA1

    659aa4cda5e74c180e59fd8ca2f6a4716f6e98a9

  • SHA256

    7a0e6de0fc707e6410bd8fb8e15f7b96d76df332d016ef9e0b6311b0991e6909

  • SHA512

    f6eb40f28f7c7afbc69239680c501d97536aea399395c9fb12cb15284dc742108dde6dfa6f0a54be1a0b6f64bffd806e29c03bdc99e03b0a97fa2a181b58e3fe

  • SSDEEP

    98304:H1owvMmmAEf6H2PxbxwXBPI8isMKnV+hAQ:H1xULr6H2PxbOdI8isM4V+hB

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

CODE

C2

twart.myfirewall.org:9792

rency.ydns.eu:5287

wqo9.firewall-gateway.de:8841

code1.ydns.eu:5287

wqo9.firewall-gateway.de:9792

Mutex

025351e291-5d1041-4fa37-932c7-869aeiQec514992

Attributes
  • encryption_key

    3145298725BA5E0DD56E87FFE3F8898EA81E6EDA

  • install_name

    Exccelworkbook.exe

  • log_directory

    Logs

  • reconnect_delay

    6000

  • startup_key

    pdfdocument

  • subdirectory

    SubDir

Targets

    • Target

      TRANSFERECIA - Banco Sabadell 20250128 € 9.750,00 Pago -www.bancsabadell.com

    • Size

      3.6MB

    • MD5

      678283be56a5f0178969a88915020601

    • SHA1

      49932acde6ce46c7e2c982985deff7297667934a

    • SHA256

      b35f831b82f4648f91b37d8b8799cb26d30b069a52cf12e14ba9b4c06e8fb571

    • SHA512

      c8a51bde2f62d7230cd350b82942fd1de149843dd006e6de9dbc8149f0009b11c02d86313d4a676f3590f2e7af00e5eee6107b15f5af0378a1fc722435ec5df5

    • SSDEEP

      98304:Ro+TeAkm0hMH+Xv590DRdEww+EwJVeZy2:RZ63pMH+Xv5GnEww+E2VeZf

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks