Resubmissions

14-06-2024 05:57

240614-gn1gysxelh 10

14-06-2024 05:49

240614-gjedxsxcpa 10

General

  • Target

    Client-built.exe

  • Size

    3.1MB

  • Sample

    240614-gn1gysxelh

  • MD5

    cb9e331e962b60a93e14496d120515b3

  • SHA1

    51ecbe795ea6e156c061dd91afc2c1bc6e8adcb4

  • SHA256

    9b4870baf1a6e62580daceb460672b03cc4c002267686340969fd55aab71bbd7

  • SHA512

    6b9b6294de1308ebc902f48f4d3de77afef27a45d5eb6cffa256a765d6b22d09184411bed0029420379f4fd22c4b137c0b6d12ef97d4a7b18d59d7ea6a2317ef

  • SSDEEP

    49152:OT2vSuS4j2WraxltyP5luXSvnA5dosAmc67BxtWoGdlTHHB72eh2NT:OTASuS4j2WraxltyP5luXS/A5dose6A

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

nexosmith1231-54169.portmap.host:54169

Mutex

607f231f-37d7-40a6-8790-f623e2b7c3d5

Attributes
  • encryption_key

    57AD3106034C3A8FFC913D430F88F63E17B5BC5D

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      Client-built.exe

    • Size

      3.1MB

    • MD5

      cb9e331e962b60a93e14496d120515b3

    • SHA1

      51ecbe795ea6e156c061dd91afc2c1bc6e8adcb4

    • SHA256

      9b4870baf1a6e62580daceb460672b03cc4c002267686340969fd55aab71bbd7

    • SHA512

      6b9b6294de1308ebc902f48f4d3de77afef27a45d5eb6cffa256a765d6b22d09184411bed0029420379f4fd22c4b137c0b6d12ef97d4a7b18d59d7ea6a2317ef

    • SSDEEP

      49152:OT2vSuS4j2WraxltyP5luXSvnA5dosAmc67BxtWoGdlTHHB72eh2NT:OTASuS4j2WraxltyP5luXS/A5dose6A

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks