General

  • Target

    random.exe

  • Size

    2.6MB

  • Sample

    250129-rgratazqcy

  • MD5

    6416961fe33e1461e8f5c455c2cf0ec9

  • SHA1

    190754691dffb4d873bd32f48722d150d338f51d

  • SHA256

    616bbced150df4c538374a032a176e88165f5e95f3fffaeae28ffa68cda552a1

  • SHA512

    8fe2fa84a62cf92d1136110e0b39bfb7f07646816ff9d9944a0d8523d26d2f2d46653ec2a9f1153fac6b3c585e0f742753959d496cab1f5a62c761dd0db1fc18

  • SSDEEP

    49152:Ux8Gt7KDrJd8spKaFxZWVAItl6dXg84Hk6BOUjbqmQnN/DAP8khk2d4zV:C974P57k6dQ8bIO2uN/DAP8khkj

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

1

C2

87.228.57.81:4782

Mutex

f832b3aa-9229-4dd0-81ec-c101146b1831

Attributes
  • encryption_key

    19A0FAF8459F69650B5965C225752D425C429EEC

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      random.exe

    • Size

      2.6MB

    • MD5

      6416961fe33e1461e8f5c455c2cf0ec9

    • SHA1

      190754691dffb4d873bd32f48722d150d338f51d

    • SHA256

      616bbced150df4c538374a032a176e88165f5e95f3fffaeae28ffa68cda552a1

    • SHA512

      8fe2fa84a62cf92d1136110e0b39bfb7f07646816ff9d9944a0d8523d26d2f2d46653ec2a9f1153fac6b3c585e0f742753959d496cab1f5a62c761dd0db1fc18

    • SSDEEP

      49152:Ux8Gt7KDrJd8spKaFxZWVAItl6dXg84Hk6BOUjbqmQnN/DAP8khk2d4zV:C974P57k6dQ8bIO2uN/DAP8khkj

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to execute payload.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks