General

  • Target

    https://github.com/mae-luadev/mae-tests/raw/main/Client-built.exe

  • Sample

    240630-pn6yqsxglg

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

MsBuild

C2

maeluadev-48337.portmap.io:48337

Mutex

4db38662-f48c-4ea6-8423-426f0674daa1

Attributes
  • encryption_key

    684009117DF150EF232A2EE8AE172085964C1CF0

  • install_name

    Runtime Broker.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Office

  • subdirectory

    Office

Targets

    • Target

      https://github.com/mae-luadev/mae-tests/raw/main/Client-built.exe

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Discovery

Query Registry

1
T1012

Command and Control

Web Service

1
T1102

Tasks