General

  • Target

    Av1 Activator.exe

  • Size

    14.0MB

  • Sample

    250204-v3hgkswkfr

  • MD5

    e580542da8b3b9d23a835600a4cb2e8b

  • SHA1

    da7129371e6ff95e7e9e7cbca876cb53913280fa

  • SHA256

    6907104c0ff29b9644167bb743c7a0056614d832f0dd160415532822254b4f24

  • SHA512

    423aa62ff3a8faf8d949a6a6559b48634ae5aab374185e91c8d349e581702fa29aae2c06f54b5dfb716ccf8be120dbe510e6e63eeff21f66a3f57cce1e3881e8

  • SSDEEP

    393216:GDNTd9YfXD5DwIpwL95M6lO7IxUc5GB2Q1cv9+inK5:kd9+zJwPL95M6lX5Gk9y

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

rdtgtdrgfd-56277.portmap.host:56277

Mutex

ccf570e8-30ac-4f23-9902-868025b6d01c

Attributes
  • encryption_key

    AB41F22B350F9B05BD105DBC654AA3C338A22A14

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    1

  • subdirectory

    SubDir

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI4OTU5MTU3OTc0NDY2NTYwMQ.GsHzQH.djdtGMjJ47j-WJek5CKvrqyGHoO3VoZvH-N1R4

  • server_id

    1290067149813055590

Targets

    • Target

      Av1 Activator.exe

    • Size

      14.0MB

    • MD5

      e580542da8b3b9d23a835600a4cb2e8b

    • SHA1

      da7129371e6ff95e7e9e7cbca876cb53913280fa

    • SHA256

      6907104c0ff29b9644167bb743c7a0056614d832f0dd160415532822254b4f24

    • SHA512

      423aa62ff3a8faf8d949a6a6559b48634ae5aab374185e91c8d349e581702fa29aae2c06f54b5dfb716ccf8be120dbe510e6e63eeff21f66a3f57cce1e3881e8

    • SSDEEP

      393216:GDNTd9YfXD5DwIpwL95M6lO7IxUc5GB2Q1cv9+inK5:kd9+zJwPL95M6lX5Gk9y

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Exela Stealer

      Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

    • Exelastealer family

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Network Service Discovery

      Attempt to gather information on host's network.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks