General

  • Target

    c27d4855b7f3649b8f12ef2b55ea2db28328c9b0a5bfe7724a6d2efb4fecfa8a.exe

  • Size

    3.5MB

  • Sample

    250201-d7wfka1rex

  • MD5

    0f8d3f0739a8356c4703d9afcf3c9e9e

  • SHA1

    a188aab63cc7f889b17be4062c8f3ad9733f877e

  • SHA256

    c27d4855b7f3649b8f12ef2b55ea2db28328c9b0a5bfe7724a6d2efb4fecfa8a

  • SHA512

    42b007929164546ebf4278a4d9d1945be70be19181c7cb1be7e1c5ec3d7f43ff942a6d59e570612543bd5a8d87e763375d61c70548c9f2fb7a87da607b0987e1

  • SSDEEP

    98304:mIELk8TSeoFjXY04O4ofnyzCiygp6R3op7ScQoijW9vICaOJF:J25CFc4jfny21+pfQoHP7

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

BILLI

C2

147.45.44.68:4782

Mutex

677eac75-4a16-45d2-8af0-7cc6e5e6d262

Attributes
  • encryption_key

    04207FE1D5AAE79F92E5E13CC9126DCA530C7527

  • install_name

    win32_svchost1.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    win32_svchost

  • subdirectory

    SubDir

Targets

    • Target

      c27d4855b7f3649b8f12ef2b55ea2db28328c9b0a5bfe7724a6d2efb4fecfa8a.exe

    • Size

      3.5MB

    • MD5

      0f8d3f0739a8356c4703d9afcf3c9e9e

    • SHA1

      a188aab63cc7f889b17be4062c8f3ad9733f877e

    • SHA256

      c27d4855b7f3649b8f12ef2b55ea2db28328c9b0a5bfe7724a6d2efb4fecfa8a

    • SHA512

      42b007929164546ebf4278a4d9d1945be70be19181c7cb1be7e1c5ec3d7f43ff942a6d59e570612543bd5a8d87e763375d61c70548c9f2fb7a87da607b0987e1

    • SSDEEP

      98304:mIELk8TSeoFjXY04O4ofnyzCiygp6R3op7ScQoijW9vICaOJF:J25CFc4jfny21+pfQoHP7

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to execute payload.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks