Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    bluestealer.7z

  • Size

    2.1MB

  • Sample

    250306-cx2zxswny8

  • MD5

    8688fa67f01c3a05ea5246ea671fa45d

  • SHA1

    bd3d0167efac90adddce82c10d679069680eeaeb

  • SHA256

    b8a46aa74b7e451ca9ae336258971d7d46334b37c487da00a6039c1d146f6d62

  • SHA512

    2a69e6331730c381d8865d5d36948b632ef010be313526b428b77e6b42f21add9b00a5e19c08631a0b0200e2cc7444eba5e5850dc65decc23f94c6168a4abdb1

  • SSDEEP

    49152:+5tB7WVB/YgSjcZlNt9pqCiLnLqJiJLKjIbHxATTg5IY9L:+53WjZlLoLqJkLZrx4TBYl

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

Win_Update_2023

C2

butterflybourne.ddns.net:4782

Mutex

QSR_MUTEX_zD2aPCc6Z0MX6eOBsy

Attributes
  • encryption_key

    JzQzojcImiy4nU59S0ns

  • install_name

    custom.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Win_Update_2023

  • subdirectory

    SubDir

Extracted

Family

azorult

C2

http://0x21.in:8000/_az/

Extracted

Family

quasar

Version

1.3.0.0

Botnet

EbayProfiles

C2

5.8.88.191:443

sockartek.icu:443

Mutex

QSR_MUTEX_0kBRNrRz5TDLEQouI0

Attributes
  • encryption_key

    MWhG6wsClMX8aJM2CVXT

  • install_name

    winsock.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    win defender run

  • subdirectory

    SubDir

Targets

    • Target

      27f824a80ebdad6b53d01f487ecb17616c0a2a9d9700ca3be3b1c1a24cdc1f71.bin

    • Size

      1.3MB

    • MD5

      2e6372abf5c58a233b273eb612950567

    • SHA1

      aed459512d857a0a6248cc9cb5785963a335b47e

    • SHA256

      27f824a80ebdad6b53d01f487ecb17616c0a2a9d9700ca3be3b1c1a24cdc1f71

    • SHA512

      ce06d3aa738e8f466c0e2be8cd9e2a79c286f4af4c7ed88da95d8b93bfa998e705eb25b6f5c9ae8d1d11fe4787f0c743edefae985d8756e822b1b003fcd61107

    • SSDEEP

      24576:7bx5ACyRtvPExqgcSSu5bqhD92oK8t7yz5b/UXq60Lnyx2M3TttxnvR:vAVRBPhbSFAhcKtYiq60LnKTVnp

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Blustealer family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

    • Target

      2c4115951e3a55fe85cf0ebb6fcf5e65ccbebfa0774a3f15db7856b74e8e6647.bin

    • Size

      1.3MB

    • MD5

      40359b10d6abf5315ad4989515c8cd85

    • SHA1

      7ff721bba3042816f6f7fd282c93d270247dd20f

    • SHA256

      2c4115951e3a55fe85cf0ebb6fcf5e65ccbebfa0774a3f15db7856b74e8e6647

    • SHA512

      b1583343d928976d222fe9ac9857e2f73f324b853e04be40602db2425c51a56681ad992d1d2adb95da454f5ce5ca1a7731ef0a380d1d84ca5b112fb182145005

    • SSDEEP

      24576:7bx5ACyRtvPExqgcSSu5bqhD92oK8t7yz5b/UXq60Lnyx2M3TttxnvZ:vAVRBPhbSFAhcKtYiq60LnKTVnR

    • BluStealer

      A Modular information stealer written in Visual Basic.

    • Blustealer family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

    • Target

      500c00d4d789bb18252fd5f3fe5ce41ae7afc1175dfeb0eb9553636c2c15450a.bin

    • Size

      2.0MB

    • MD5

      4100474701cdd949eeb746204b304884

    • SHA1

      b10084c336561ee34428e6854cd3e55f3739b309

    • SHA256

      500c00d4d789bb18252fd5f3fe5ce41ae7afc1175dfeb0eb9553636c2c15450a

    • SHA512

      171a71b983e214c7b9b1f714126d4adb8eae37b30daa135ba134c8bc2adf8bb638bf6d6b839d1d27adbdadfc47786265530f44163847edb7d56ec12cc032dd42

    • SSDEEP

      24576:BknTbMEnBzUZ+NbQM6YmDKSUlmDaGJTA4Pqa6jUvOkQu:unMEBza+N9aDKLkDl+dUvO

    Score
    3/10
    • Target

      73592f050eb0d6d8621fed9a739c491029c7975f257a9ceba4c6f2f211c7831c.bin

    • Size

      2.0MB

    • MD5

      3c63ad1e2e8970c53fbf2be431c7fc36

    • SHA1

      87391866f4a2661eb0cb027a9cfeb2d3a7335eca

    • SHA256

      73592f050eb0d6d8621fed9a739c491029c7975f257a9ceba4c6f2f211c7831c

    • SHA512

      2aea8b499ace63d12fbd49d92ddb49fcbc9da162116343254d6ff47b2a151c0558afff25a7b5a5f58af3602dfab5890d9fa45554da8eb0d6bab806a334bf7521

    • SSDEEP

      24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYW:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YE

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • Target

      b086986db5990b434fbf33a030d727d4a5316c5cc154ebf0c1b9433833670176.bin

    • Size

      2.0MB

    • MD5

      17720d715313d08dc36eb0499424230a

    • SHA1

      c3913c55b50c9055625df6d6752be2f272622f1d

    • SHA256

      b086986db5990b434fbf33a030d727d4a5316c5cc154ebf0c1b9433833670176

    • SHA512

      fc9a13571cf6e09c335d2a73f2eb11265a4f774dd940eb684faecbaefea3d9398b0d5136b763f210a20a5bdf872e52b8269ae9b89cb01bf392f0296a982d6712

    • SSDEEP

      24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYb:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YJ

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • Target

      b99dab26a9787a8361f75905fa34de2fc05e19f6d5d70bd70f045e0bab05f4fc.bin

    • Size

      365KB

    • MD5

      57e44c04fcf797cc96f11a5e539dcf45

    • SHA1

      ccb1a5049980889cfe8d96ceba005c536d25e017

    • SHA256

      b99dab26a9787a8361f75905fa34de2fc05e19f6d5d70bd70f045e0bab05f4fc

    • SHA512

      9caf54fb294cd085bbd0337d70a9bfc0b11351a9ea46b0a09fc6a5e869bd8b15a6ea514f758aed9169894c82f271611f1ecb10570f99a0b76a79e28b3b462c95

    • SSDEEP

      6144:Yx6bPXhLApfpIcE/ckl2La1bz4uUYHD7XKj8lxfBA66Ec2KHv:4mhAp8Bl9N4lkmj8RA6pcL

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Target

      c9fc6dc8c8dbff7eff9a199440ef52348cf2d410da5d6940d3648d6fa1f568e6.bin

    • Size

      2.0MB

    • MD5

      eb37bef34881d2353e4cb76bfefa7d37

    • SHA1

      855dd99b54b63e9372d2d3a2436250d1e1b50739

    • SHA256

      c9fc6dc8c8dbff7eff9a199440ef52348cf2d410da5d6940d3648d6fa1f568e6

    • SHA512

      7e487e5d70af4a57051a0bec77812651a299b0de522f704d4b24dd541f34e46f6393deab4ed63e5d80703c4fa73cdd491dac513c4ca2991db23489c7d704e5e8

    • SSDEEP

      24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYg:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yq

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • Target

      caf5832156e063db5f23ccdb510600cefc45d65281d57771f19637daf7f3d7ad.bin

    • Size

      2.0MB

    • MD5

      a7d2254dd17852abff4794059b2ba5f6

    • SHA1

      45ea0c75357b0854dbee73244d1238c14b8c0107

    • SHA256

      caf5832156e063db5f23ccdb510600cefc45d65281d57771f19637daf7f3d7ad

    • SHA512

      b403f0611c36da0a20313d6d518aa27ca6ac5ce5fc9b34a20fa14c47faa355ade25f952904d4503eedb97aadd9b81e560439a003164c59dc5cee25f8b95a1f6e

    • SSDEEP

      24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYz:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Y5

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • Target

      cf18bda81a0c95a61a47ece2c1fd879e86e3f1fbd64f3e291fee2d5ca96171a2.bin

    • Size

      2.0MB

    • MD5

      eb5078a37d60f4b968af5955fb31555e

    • SHA1

      3e0fccb93c56bed19b6e01ac24d1517b89696efb

    • SHA256

      cf18bda81a0c95a61a47ece2c1fd879e86e3f1fbd64f3e291fee2d5ca96171a2

    • SHA512

      574c9a234e316c5576812001e61eb554ab3a42d2663265e35e001f5aaf53f1fd310acd46d453f8e0ddbcaa7ee0424b5c49c8cf29478fcf65e11dbcc6ab6bab23

    • SSDEEP

      24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKY5:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9YT

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • Target

      d1f112692188b7a7cd36cafc7751da401af6d5e6ff73a89ea988c553d00bd93e.bin

    • Size

      2.0MB

    • MD5

      3122ecf57731e501138565db5741fe49

    • SHA1

      5a41892c9e73afde78510c0426da994d21515e9e

    • SHA256

      d1f112692188b7a7cd36cafc7751da401af6d5e6ff73a89ea988c553d00bd93e

    • SHA512

      d49434de0cbb63f44bba3e6e57bf7471bc2ce71b6efa81c1bacbf3bcf8e6c4138526c06760cb461b46ccb0b44f2d9e2422bd37352c1f60a952dfbaa6a8be8513

    • SSDEEP

      24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYY:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yu

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • Target

      e329eaa5c013df43ea579571a5ae4d65f8cfd04809aeeb219551c80d6ff42bcd.bin

    • Size

      2.0MB

    • MD5

      89bdd75e21e97be92659871ce863eaa3

    • SHA1

      795d9044f2ae440e92f21dee42b0ccc884c94fc9

    • SHA256

      e329eaa5c013df43ea579571a5ae4d65f8cfd04809aeeb219551c80d6ff42bcd

    • SHA512

      5cb6efc9c022c448cca77f66b12a3ffbecede46cb76815134b87d9c4b7daeb712e7eb9b6f472f5d208b4c51ce4e12b0cd2d0dd5de6e453b16e739a1970f2a1e5

    • SSDEEP

      24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYM:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Ya

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

    • Target

      eba45a34e3dfa65dd307af9f5c018bf48aeb4a08fac42ca2899f9334b34e870b.bin

    • Size

      2.0MB

    • MD5

      7888711f3d11f449955d82d767ee9762

    • SHA1

      5fc94a3d3d7aff5884a1732ee796b3f5fdd3364b

    • SHA256

      eba45a34e3dfa65dd307af9f5c018bf48aeb4a08fac42ca2899f9334b34e870b

    • SHA512

      40d3b9548fb12f0ff0d035c654349d0e849c9715d81f3ae82909214596461247f5832672c2fc0aff30e9e5d329194c554e433fb8642a68635be78c92b4e9733b

    • SSDEEP

      24576:su6J33O0c+JY5UZ+XC0kGso6FaI1IXgM6YmenKKSUlmDaGJTA4Pqa6jUvOkQwKYf:2u0c++OCvkGs9Fap5aLKLkDl+dUvO9Yx

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Azorult family

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

static1

win_update_2023quasar
Score
10/10

behavioral1

blustealerdiscoverystealer
Score
10/10

behavioral2

blustealerdiscoverystealer
Score
10/10

behavioral3

blustealerdiscoverystealer
Score
10/10

behavioral4

blustealerdiscoverystealer
Score
10/10

behavioral5

Score
1/10

behavioral6

Score
3/10

behavioral7

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10

behavioral8

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10

behavioral9

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10

behavioral10

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10

behavioral11

quasarwin_update_2023discoveryspywaretrojan
Score
10/10

behavioral12

quasarwin_update_2023discoveryspywaretrojan
Score
10/10

behavioral13

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10

behavioral14

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10

behavioral15

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10

behavioral16

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10

behavioral17

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10

behavioral18

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10

behavioral19

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10

behavioral20

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10

behavioral21

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10

behavioral22

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10

behavioral23

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10

behavioral24

azorultquasarebayprofilesdiscoveryinfostealerspywaretrojan
Score
10/10