General

  • Target

    Loader.exe

  • Size

    3.1MB

  • Sample

    240627-xk4yzaxelq

  • MD5

    98cd04c4ac429841ac630d57a8407c6f

  • SHA1

    dcbde5d92c108aceca4342ca2b89157d4bd0444e

  • SHA256

    85b551f3f7d0b53ec30709df217d767e2358e74efae7df9bfa9e74f48ead784d

  • SHA512

    66f7b6c4c0cd1b1abad5f5a500b77cf7601004e269acb313381cc074b58d6a127913adf0bc4da439f5df361d0252e645ab5d6ad5378c1933a8592d1997e826b3

  • SSDEEP

    49152:Xv0uf2NUaNmwzPWlvdaKM7ZxTwHMxOFFmzqcoGd4QTHHB72eh2NT:Xvjf2NUaNmwzPWlvdaB7ZxTwsxOFMo

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

history-foo.gl.at.ply.gg:42349

Mutex

51fe5088-4e6f-43ea-a53f-ed49150587aa324254r4r3weff4f45r3ewwtrfrt

Attributes
  • encryption_key

    CBFC5D217E55BEBDCD3A6EFA924299F76BC328D9

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Update

  • subdirectory

    SubDir

Targets

    • Target

      Loader.exe

    • Size

      3.1MB

    • MD5

      98cd04c4ac429841ac630d57a8407c6f

    • SHA1

      dcbde5d92c108aceca4342ca2b89157d4bd0444e

    • SHA256

      85b551f3f7d0b53ec30709df217d767e2358e74efae7df9bfa9e74f48ead784d

    • SHA512

      66f7b6c4c0cd1b1abad5f5a500b77cf7601004e269acb313381cc074b58d6a127913adf0bc4da439f5df361d0252e645ab5d6ad5378c1933a8592d1997e826b3

    • SSDEEP

      49152:Xv0uf2NUaNmwzPWlvdaKM7ZxTwHMxOFFmzqcoGd4QTHHB72eh2NT:Xvjf2NUaNmwzPWlvdaB7ZxTwsxOFMo

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Discovery

Query Registry

1
T1012

Tasks