General

  • Target

    8a54d056aeda3294b96434794bfc06246f4d88585773b0da3fdd1aebdae80da4.exe

  • Size

    348KB

  • Sample

    250205-ejrm5syldt

  • MD5

    f605752fad4e292cf6b1073e3ab590ee

  • SHA1

    66c8734f3a6db32d1ab5b1ba5c3fc097423314fa

  • SHA256

    8a54d056aeda3294b96434794bfc06246f4d88585773b0da3fdd1aebdae80da4

  • SHA512

    6bb83996ebf34ef5a8567822148960aaceaaf8e76ce7981e589d98d79d1533189ba750da7b2b5eda147f24b27f90da1c26411e3949b385831b9360635b2ba6f3

  • SSDEEP

    6144:4XNHXf500MYYSzKEQbcPKHeXMuvQK/ZzJzz7O:Gd504n1RvQKxtznO

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Server

C2

qjas.duckdns.org:55950

Mutex

QSR_MUTEX_jgz2oEahB8s3KyEOO6

Attributes
  • encryption_key

    gj45F7I9UftmOOGvZded

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Google Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      8a54d056aeda3294b96434794bfc06246f4d88585773b0da3fdd1aebdae80da4.exe

    • Size

      348KB

    • MD5

      f605752fad4e292cf6b1073e3ab590ee

    • SHA1

      66c8734f3a6db32d1ab5b1ba5c3fc097423314fa

    • SHA256

      8a54d056aeda3294b96434794bfc06246f4d88585773b0da3fdd1aebdae80da4

    • SHA512

      6bb83996ebf34ef5a8567822148960aaceaaf8e76ce7981e589d98d79d1533189ba750da7b2b5eda147f24b27f90da1c26411e3949b385831b9360635b2ba6f3

    • SSDEEP

      6144:4XNHXf500MYYSzKEQbcPKHeXMuvQK/ZzJzz7O:Gd504n1RvQKxtznO

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks