General

  • Target

    WyvernnLoader.exe

  • Size

    3.1MB

  • Sample

    240616-gxg2zasdrc

  • MD5

    20439c02fe70f153d85345400fa4515f

  • SHA1

    03fbf291e052985d5f6a67017de3526f9aecd894

  • SHA256

    1300e8d80b44ac28c3ecb3968c65f6543a4dec7493b65b3d62663116b1ec447c

  • SHA512

    0c419ce091586058ac876824c8f39ad25f43b012b06e15e47b6cb503eddf6dfe3c1939c4cb9c2b43b8cc814049377e0f72c4fa28b2e98b900b02f5d901f1929b

  • SSDEEP

    49152:6vdI22SsaNYfdPBldt698dBcjHmC11J0eoGd/cTHHB72eh2NT:6v222SsaNYfdPBldt6+dBcjHmCZ

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

147.185.221.18:18043

Mutex

b70563dc-1a4b-4e44-8c78-87c8f325342d

Attributes
  • encryption_key

    211206313CE42AACEA301C4CAC6CB50A5128C03B

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    Management

Targets

    • Target

      WyvernnLoader.exe

    • Size

      3.1MB

    • MD5

      20439c02fe70f153d85345400fa4515f

    • SHA1

      03fbf291e052985d5f6a67017de3526f9aecd894

    • SHA256

      1300e8d80b44ac28c3ecb3968c65f6543a4dec7493b65b3d62663116b1ec447c

    • SHA512

      0c419ce091586058ac876824c8f39ad25f43b012b06e15e47b6cb503eddf6dfe3c1939c4cb9c2b43b8cc814049377e0f72c4fa28b2e98b900b02f5d901f1929b

    • SSDEEP

      49152:6vdI22SsaNYfdPBldt698dBcjHmC11J0eoGd/cTHHB72eh2NT:6v222SsaNYfdPBldt6+dBcjHmCZ

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

System Information Discovery

3
T1082

Query Registry

3
T1012

Tasks