General

  • Target

    2026.vbs

  • Size

    275KB

  • Sample

    250130-k1vn1symfq

  • MD5

    3036e9c4718042d10f79bfff33890123

  • SHA1

    506e3824f97a346ebfac946aaf19b13defa80cac

  • SHA256

    027ff65365c4f69731be566e541127a63d993d26f68738a462ec63b667226990

  • SHA512

    6cc407e53f5057a3469dc4cd62586cfa740339adcde218ef54446e9af75165aa08bbc088ec9f02015334c4f9abd4e3d69db4eb2ced0c66e8f8e3e1b1f4e70ebc

  • SSDEEP

    3072:S9bhZuU+jd2EOHov4nc8b5tBuyAUvmSWBQ0MY5abVt+/710ROsvTkRoaDSyav3DW:CbhAZd2EOdTN7vrV0M2abV4jaTbwDEC

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    3000

Targets

    • Target

      2026.vbs

    • Size

      275KB

    • MD5

      3036e9c4718042d10f79bfff33890123

    • SHA1

      506e3824f97a346ebfac946aaf19b13defa80cac

    • SHA256

      027ff65365c4f69731be566e541127a63d993d26f68738a462ec63b667226990

    • SHA512

      6cc407e53f5057a3469dc4cd62586cfa740339adcde218ef54446e9af75165aa08bbc088ec9f02015334c4f9abd4e3d69db4eb2ced0c66e8f8e3e1b1f4e70ebc

    • SSDEEP

      3072:S9bhZuU+jd2EOHov4nc8b5tBuyAUvmSWBQ0MY5abVt+/710ROsvTkRoaDSyav3DW:CbhAZd2EOdTN7vrV0M2abV4jaTbwDEC

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks