General

  • Target

    4e5e207318513ffd66653a5106a121d2790a98dc25a103c67c3476b142612915.exe

  • Size

    863KB

  • Sample

    240613-vwzsaaxcna

  • MD5

    1ebc16b09f9f1cdf224a0b50333c95ae

  • SHA1

    33c77f6b12a89171f91a212b233a43d4dfd9be71

  • SHA256

    4e5e207318513ffd66653a5106a121d2790a98dc25a103c67c3476b142612915

  • SHA512

    f3dc8cec13b6eef1b2bad396fc7291fc3c026031283a5b30749f4e593fa8954981bb97e9c49f8d27aa146f5e9f55d315b774ce6ae2e2b57c5b5c2a9f4b21cebd

  • SSDEEP

    12288:EgxwPTQBSqsfmrrPccQejxv6LP9V/Z+jqV1JudejYmKD4/h9lDS0SqEVVEbNoi11:VxFeqPNFycCMdeqD4ZDpSfVaCqDnh

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

Office04

C2

38.180.9.93:4782

Mutex

5a8251f0-2689-4ef1-8412-aac562e02a4d

Attributes
  • encryption_key

    C9BC046B617DD0F608706B9640C8D97C327969FB

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    ent Startup

  • subdirectory

    SubDir

Targets

    • Target

      4e5e207318513ffd66653a5106a121d2790a98dc25a103c67c3476b142612915.exe

    • Size

      863KB

    • MD5

      1ebc16b09f9f1cdf224a0b50333c95ae

    • SHA1

      33c77f6b12a89171f91a212b233a43d4dfd9be71

    • SHA256

      4e5e207318513ffd66653a5106a121d2790a98dc25a103c67c3476b142612915

    • SHA512

      f3dc8cec13b6eef1b2bad396fc7291fc3c026031283a5b30749f4e593fa8954981bb97e9c49f8d27aa146f5e9f55d315b774ce6ae2e2b57c5b5c2a9f4b21cebd

    • SSDEEP

      12288:EgxwPTQBSqsfmrrPccQejxv6LP9V/Z+jqV1JudejYmKD4/h9lDS0SqEVVEbNoi11:VxFeqPNFycCMdeqD4ZDpSfVaCqDnh

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • UAC bypass

    • Windows security bypass

    • Looks for VirtualBox Guest Additions in registry

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Scheduled Task/Job

1
T1053

Defense Evasion

Abuse Elevation Control Mechanism

1
T1548

Bypass User Account Control

1
T1548.002

Impair Defenses

3
T1562

Disable or Modify Tools

3
T1562.001

Modify Registry

4
T1112

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Tasks