General

  • Target

    CodexPC.exe

  • Size

    3.1MB

  • Sample

    240701-3nbz9a1bjj

  • MD5

    067c32e716711066c26ba28da4ba13b0

  • SHA1

    425fc4cc02015126ffe428d57380a84b751193bd

  • SHA256

    7fcfd3f74ffacc95defd54727da2a55cd66788e8d0a89f8cc0338478ea9d81b1

  • SHA512

    88e147eda7e9948bb9405dc2d3e103184ed88ab482d97ea31edfff42197dac132415dc9a48b7b5cb06ba3083ca1b0f3614f338602704b0b5daa62d5fc2563cea

  • SSDEEP

    49152:WvjY52fyaSZOrPWluWBuGG5g5hPa0BGsJZoGdVTHHB72eh2NT:Wvk52fyaSZOrPWluWBDG5g5hPZBGsr

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

CodexPc

C2

svrc.exe:4782

Mutex

b0c5242e-3070-482a-8822-4ff0321e2f40

Attributes
  • encryption_key

    4F0E2FCF42F1C1DE2B9EDD3E03C766626C2BBEB6

  • install_name

    CodexPC.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    CodexAutoRun

  • subdirectory

    SubDir

Targets

    • Target

      CodexPC.exe

    • Size

      3.1MB

    • MD5

      067c32e716711066c26ba28da4ba13b0

    • SHA1

      425fc4cc02015126ffe428d57380a84b751193bd

    • SHA256

      7fcfd3f74ffacc95defd54727da2a55cd66788e8d0a89f8cc0338478ea9d81b1

    • SHA512

      88e147eda7e9948bb9405dc2d3e103184ed88ab482d97ea31edfff42197dac132415dc9a48b7b5cb06ba3083ca1b0f3614f338602704b0b5daa62d5fc2563cea

    • SSDEEP

      49152:WvjY52fyaSZOrPWluWBuGG5g5hPa0BGsJZoGdVTHHB72eh2NT:Wvk52fyaSZOrPWluWBDG5g5hPZBGsr

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Persistence

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Privilege Escalation

Scheduled Task/Job

1
T1053

Scheduled Task

1
T1053.005

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Query Registry

1
T1012

Tasks