General

  • Target

    user.exe

  • Size

    3.2MB

  • Sample

    250208-tjjd4atnfv

  • MD5

    6c6b777d8e1ca16b3f2be293d1b417d4

  • SHA1

    5a2e987253aa8c4606e5e8829c4ab823891226c2

  • SHA256

    48f11a020991c4c5990a1431ef576a7c5e3f502da65fd12a834ad0108310fa79

  • SHA512

    fc3698b5eeeb530a45cd58ecec8240a7411070dcb92dff0657e3e67e74b8a42069bd6c96532f2b1a3a33ac0118e17cdf40233abccea303da8ff1747e20b87913

  • SSDEEP

    98304:zWfPAgtmK4/pkEIcqDGrTQBEju6shMcfjWxZkuT8A:KnDmTIBDKTq6s6cfjWX8A

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

installs

C2

uptimebot.kozow.com:1433

Mutex

e9dcc42b-891b-4ecf-8c28-a7f0902ea9f5

Attributes
  • encryption_key

    BEAE5A044A95E05C2D32FE96BBDBA968D6356219

  • install_name

    plesk.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Startup

  • subdirectory

    Plesk

Targets

    • Target

      user.exe

    • Size

      3.2MB

    • MD5

      6c6b777d8e1ca16b3f2be293d1b417d4

    • SHA1

      5a2e987253aa8c4606e5e8829c4ab823891226c2

    • SHA256

      48f11a020991c4c5990a1431ef576a7c5e3f502da65fd12a834ad0108310fa79

    • SHA512

      fc3698b5eeeb530a45cd58ecec8240a7411070dcb92dff0657e3e67e74b8a42069bd6c96532f2b1a3a33ac0118e17cdf40233abccea303da8ff1747e20b87913

    • SSDEEP

      98304:zWfPAgtmK4/pkEIcqDGrTQBEju6shMcfjWxZkuT8A:KnDmTIBDKTq6s6cfjWX8A

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks