General

  • Target

    http://tinyurl.com/4ypskr89

  • Sample

    250207-q6zg2ssqgv

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

loomis5

C2

jungsystem.zapto.org:4444

Mutex

QSR_MUTEX_wEhsbPnhWYH1QahVH5

Attributes
  • encryption_key

    mnw0PrBTAfzdFHZMkkIU

  • install_name

    svhostt.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    svhostt

  • subdirectory

    SubDir

Targets

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks