General

  • Target

    BypasserRunFirst.exe

  • Size

    3.1MB

  • Sample

    250208-s28ahasqdy

  • MD5

    2c39f6ceea730bcfd551fb106fddf974

  • SHA1

    5fbb018bd30429085f0309503901e04625a8847b

  • SHA256

    7dcda14173a0d102d6a02d290cbba10bd8a70e689375700bf0f322ea500c11c2

  • SHA512

    5a24f72f34170f3396524d062c4ae63c4f8ca6766783aeb730c063a8e8dff36a95f2054d45a3c9e0b5292818f70dc9bd7e2c65bb2f573537241d4f8c438fbbad

  • SSDEEP

    49152:SvLlL26AaNeWgPhlmVqvMQ7XSKuiSg1J/VoGd0hTHHB72eh2NT:SvxL26AaNeWgPhlmVqkQ7XSKuiSO

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

192.168.3.210:4782

Mutex

66e2d8be-f2d1-430b-a858-bea567f34e0d

Attributes
  • encryption_key

    6DDF2A1446CC876583B8AB188D7732CB160FAE85

  • install_name

    TemperSpoferByCapyLovers.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      BypasserRunFirst.exe

    • Size

      3.1MB

    • MD5

      2c39f6ceea730bcfd551fb106fddf974

    • SHA1

      5fbb018bd30429085f0309503901e04625a8847b

    • SHA256

      7dcda14173a0d102d6a02d290cbba10bd8a70e689375700bf0f322ea500c11c2

    • SHA512

      5a24f72f34170f3396524d062c4ae63c4f8ca6766783aeb730c063a8e8dff36a95f2054d45a3c9e0b5292818f70dc9bd7e2c65bb2f573537241d4f8c438fbbad

    • SSDEEP

      49152:SvLlL26AaNeWgPhlmVqvMQ7XSKuiSg1J/VoGd0hTHHB72eh2NT:SvxL26AaNeWgPhlmVqkQ7XSKuiSO

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Downloads MZ/PE file

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks