General
-
Target
fart-with-extra-reverb.mp3
-
Size
121KB
-
Sample
250308-tzhshazshx
-
MD5
56a2f872e5106165bb09f2952c467114
-
SHA1
a492b74ceb9f5fc5cf4ff26ec96d063bbcb58230
-
SHA256
b74577a99903aeadc8f89af84b81374e9e1a25562861cf4aff2d8a211cbe68db
-
SHA512
5deadc5b63296e9224dd7a72b4220f5b47917fb4a31f97863308f78fa9f7f373aebf07850c81e3632de9c5b040cd9c014851e8a978ef44d1df7ec34f7975955f
-
SSDEEP
3072:2TfH2lqavCLMpbhmO1FBBU4YJjq4ht+lSCtTaAoUAX4:eH2lq/Qbhm6jYJjq43fCtTaAon4
Static task
static1
Behavioral task
behavioral1
Sample
fart-with-extra-reverb.mp3
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
NOT A RAT LOLLOOLOOL
127.0.0.1:4782
e2fa2f23-b5a1-410d-9a72-2c090526a166
-
encryption_key
BAC051964C78782D889217F5027866F57C238E02
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Anti Virus (not fourbeexnine rat0
-
subdirectory
SubDir
Extracted
quasar
1.4.1
HH
127.0.0.1:4782
29e82417-3104-4d6c-8d5e-f1161ddaeb44
-
encryption_key
BAC051964C78782D889217F5027866F57C238E02
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Anti Virus (not fourbeexnine rat0
-
subdirectory
SubDir
Targets
-
-
Target
fart-with-extra-reverb.mp3
-
Size
121KB
-
MD5
56a2f872e5106165bb09f2952c467114
-
SHA1
a492b74ceb9f5fc5cf4ff26ec96d063bbcb58230
-
SHA256
b74577a99903aeadc8f89af84b81374e9e1a25562861cf4aff2d8a211cbe68db
-
SHA512
5deadc5b63296e9224dd7a72b4220f5b47917fb4a31f97863308f78fa9f7f373aebf07850c81e3632de9c5b040cd9c014851e8a978ef44d1df7ec34f7975955f
-
SSDEEP
3072:2TfH2lqavCLMpbhmO1FBBU4YJjq4ht+lSCtTaAoUAX4:eH2lq/Qbhm6jYJjq43fCtTaAon4
-
Nanocore family
-
Quasar family
-
Quasar payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks whether UAC is enabled
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1