General

  • Target

    Downloads.exe

  • Size

    1.6MB

  • Sample

    250331-qsaa1a1sax

  • MD5

    1e356cc44d9fafcd633b2e372a46ad53

  • SHA1

    0d0a32521cad4cb38dc3c841a486ed21a5454943

  • SHA256

    a729ddb411ab2f5a818be693d12b245215e5eb6ea79fad2fa87d85ea3e2cf683

  • SHA512

    91fa09c5be7543cbd4356370b2059521dc7ae2a47462f5871427a1ad5448249c9bf1e384c58c0966227a85574c913c09b9cff62f5bcae36ada9e8695b94e47cd

  • SSDEEP

    24576:jngHKYfXTkXy0Z0UplCOlyyXEwlKhgoCY9X8jOlC3rocE/0sED5cHD:zgqKIXzryOMoBlKRCgvA5M

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

102.41.58.213:5505

Mutex

1e97a2db-0622-4c39-84ac-2f640c70aaf5

Attributes
  • encryption_key

    1F6CCF154B4C85A58D675CA9A482E9C7A041C879

  • install_name

    svchost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    svchost

  • subdirectory

    SubDir

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

197.48.105.157:5505

41.233.14.164:5505

197.48.230.161:5505

102.41.58.213:5505

Mutex

RW4mawavalFO

Attributes
  • delay

    3

  • install

    true

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Targets

    • Target

      Downloads.exe

    • Size

      1.6MB

    • MD5

      1e356cc44d9fafcd633b2e372a46ad53

    • SHA1

      0d0a32521cad4cb38dc3c841a486ed21a5454943

    • SHA256

      a729ddb411ab2f5a818be693d12b245215e5eb6ea79fad2fa87d85ea3e2cf683

    • SHA512

      91fa09c5be7543cbd4356370b2059521dc7ae2a47462f5871427a1ad5448249c9bf1e384c58c0966227a85574c913c09b9cff62f5bcae36ada9e8695b94e47cd

    • SSDEEP

      24576:jngHKYfXTkXy0Z0UplCOlyyXEwlKhgoCY9X8jOlC3rocE/0sED5cHD:zgqKIXzryOMoBlKRCgvA5M

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Detect Umbral payload

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Umbral

      Umbral stealer is an opensource moduler stealer written in C#.

    • Umbral family

    • Async RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks