General

  • Target

    WyvernnLoader.bat

  • Size

    1.6MB

  • Sample

    240616-gzve3ssepc

  • MD5

    2e8b7b4aa7c67de8af9a98796ebef407

  • SHA1

    1b431b74102a1f321833d8eff397667c77c65e6e

  • SHA256

    f4b37a9883067f99e2d4c09c5c7c99e50c694212808d6041623644c574177e8b

  • SHA512

    d0d6756843ea10d369e98a3e4a75d00e0fd59416f415c57637576cf47ebc9c3f1f4b2debaf1db16f48f76f8c206ba257ec3f14f1d8fdd5382f0bfc228a231463

  • SSDEEP

    24576:NLS0EdLggkaNdVHdPZHaTrqYXWfX2wTcxG/VxDrG4BmJL549VbiIN8zCQj4rae1:NB+8xaHV9PWRfKTb2Bja

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

147.185.221.18:18043

Mutex

b70563dc-1a4b-4e44-8c78-87c8f325342d

Attributes
  • encryption_key

    211206313CE42AACEA301C4CAC6CB50A5128C03B

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    Management

Targets

    • Target

      WyvernnLoader.bat

    • Size

      1.6MB

    • MD5

      2e8b7b4aa7c67de8af9a98796ebef407

    • SHA1

      1b431b74102a1f321833d8eff397667c77c65e6e

    • SHA256

      f4b37a9883067f99e2d4c09c5c7c99e50c694212808d6041623644c574177e8b

    • SHA512

      d0d6756843ea10d369e98a3e4a75d00e0fd59416f415c57637576cf47ebc9c3f1f4b2debaf1db16f48f76f8c206ba257ec3f14f1d8fdd5382f0bfc228a231463

    • SSDEEP

      24576:NLS0EdLggkaNdVHdPZHaTrqYXWfX2wTcxG/VxDrG4BmJL549VbiIN8zCQj4rae1:NB+8xaHV9PWRfKTb2Bja

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Deletes itself

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

Tasks