General

  • Target

    Loader.exe

  • Size

    3.1MB

  • Sample

    240627-x8d3fswgrh

  • MD5

    daf9409eb0c42c801076c1eebc574c9f

  • SHA1

    18312de07c4f7bbc4181850b22d5195d17dd6e7b

  • SHA256

    215f5b71ce3863e06a15912c7c50435e47b7e371d4d5b0aa91141757978ed2ea

  • SHA512

    ef067f9fc07c5a9c100c8dc804cd09492fdeeb4821c939078db1a848b712229e26c5e005851518b31528bf733c27c1d19d9fe6c374fc37a597055c591e09dfd2

  • SSDEEP

    49152:zv0uf2NUaNmwzPWlvdaKM7ZxTwCeRJ6FbR3LoGdaTHHB72eh2NT:zvjf2NUaNmwzPWlvdaB7ZxTwCeRJ6X

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

history-foo.gl.at.ply.gg:42349

Mutex

51fe5088-4e6f-43ea-a53f-ed49150587aa324254r4r3weff4f45r3ewwtrfrt

Attributes
  • encryption_key

    CBFC5D217E55BEBDCD3A6EFA924299F76BC328D9

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Update

  • subdirectory

    SubDir

Targets

    • Target

      Loader.exe

    • Size

      3.1MB

    • MD5

      daf9409eb0c42c801076c1eebc574c9f

    • SHA1

      18312de07c4f7bbc4181850b22d5195d17dd6e7b

    • SHA256

      215f5b71ce3863e06a15912c7c50435e47b7e371d4d5b0aa91141757978ed2ea

    • SHA512

      ef067f9fc07c5a9c100c8dc804cd09492fdeeb4821c939078db1a848b712229e26c5e005851518b31528bf733c27c1d19d9fe6c374fc37a597055c591e09dfd2

    • SSDEEP

      49152:zv0uf2NUaNmwzPWlvdaKM7ZxTwCeRJ6FbR3LoGdaTHHB72eh2NT:zvjf2NUaNmwzPWlvdaB7ZxTwCeRJ6X

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Discovery

Query Registry

1
T1012

Tasks