General

  • Target

    Build.exe

  • Size

    8.0MB

  • Sample

    250331-qp8dmatjy4

  • MD5

    5aeb840fa69ff4dcd8ba0816a2da1434

  • SHA1

    e710536efe591bb5cf24e3b4cd270775feffddb6

  • SHA256

    1f33f50f29b612c23fe2890fe9567c42e2512ae3c7818f3c60879665019bb4df

  • SHA512

    44c277c1fdd72b2e246bb511f4686df823636c41acaf8d2825c4399a216f48b6d037b9c197db6134464a5c54156648e8bf96dff72bda1426f58578de740a9f72

  • SSDEEP

    49152:zf+7HoOWA0PMlJmN8UkruiWIKYqAFs6eYfZVmBumJzMmbmMqoBLPg4NOW:zG7HlQ6Jg8RrucFs6e6ZV5mJQmbmNW

Malware Config

Extracted

Family

quasar

Version

1.5.0

Botnet

Office04

C2

51.89.204.80:4782

Mutex

65581c6d-14ba-4da9-86dd-ffd8304b8eb1

Attributes
  • encryption_key

    8C25D2F2D6CDE756BAFC0531B3B70446BFBAF003

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Modded Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      Build.exe

    • Size

      8.0MB

    • MD5

      5aeb840fa69ff4dcd8ba0816a2da1434

    • SHA1

      e710536efe591bb5cf24e3b4cd270775feffddb6

    • SHA256

      1f33f50f29b612c23fe2890fe9567c42e2512ae3c7818f3c60879665019bb4df

    • SHA512

      44c277c1fdd72b2e246bb511f4686df823636c41acaf8d2825c4399a216f48b6d037b9c197db6134464a5c54156648e8bf96dff72bda1426f58578de740a9f72

    • SSDEEP

      49152:zf+7HoOWA0PMlJmN8UkruiWIKYqAFs6eYfZVmBumJzMmbmMqoBLPg4NOW:zG7HlQ6Jg8RrucFs6e6ZV5mJQmbmNW

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • StormKitty

      StormKitty is an open source info stealer written in C#.

    • StormKitty payload

    • Stormkitty family

    • Downloads MZ/PE file

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks