General

  • Target

    349ffb723c954fcec9d2e46d2314f01f35edb4cbfd603f7cdd17955b5ebe018b.exe

  • Size

    3.1MB

  • Sample

    240613-bjwqbascpp

  • MD5

    1a0e513aabba1cb6179aff86bf78fc30

  • SHA1

    853c503fb985ac0163cc336e35e3deed82038dfe

  • SHA256

    349ffb723c954fcec9d2e46d2314f01f35edb4cbfd603f7cdd17955b5ebe018b

  • SHA512

    14380e5904f92575297eb13c0b7fcca71bf08a4960e2a636b732d5ff8e4c402ab3d3504d5ce1e65071c21a728ce7ab312a1ab26d893ccdf0a47271c3f4014fbe

  • SSDEEP

    49152:yv/t62XlaSFNWPjljiFa2RoUYIhwR16tbR3yoGdWOTHHB72eh2NT:yvV62XlaSFNWPjljiFXRoUYIhwR16u

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

5.180.155.40:4782

Mutex

415c48e5-3c68-4038-a29a-f94aac869007

Attributes
  • encryption_key

    D702E1C9C12F7506F62FD8C13803B5905F7DB89D

  • install_name

    svhost.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    conhost

  • subdirectory

    Wındows

Targets

    • Target

      349ffb723c954fcec9d2e46d2314f01f35edb4cbfd603f7cdd17955b5ebe018b.exe

    • Size

      3.1MB

    • MD5

      1a0e513aabba1cb6179aff86bf78fc30

    • SHA1

      853c503fb985ac0163cc336e35e3deed82038dfe

    • SHA256

      349ffb723c954fcec9d2e46d2314f01f35edb4cbfd603f7cdd17955b5ebe018b

    • SHA512

      14380e5904f92575297eb13c0b7fcca71bf08a4960e2a636b732d5ff8e4c402ab3d3504d5ce1e65071c21a728ce7ab312a1ab26d893ccdf0a47271c3f4014fbe

    • SSDEEP

      49152:yv/t62XlaSFNWPjljiFa2RoUYIhwR16tbR3yoGdWOTHHB72eh2NT:yvV62XlaSFNWPjljiFXRoUYIhwR16u

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables containing common artifacts observed in infostealers

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Tasks