TLP-WHITE

Logo

Walkthroughs, challenges, and examples of host compromises

View My GitHub Profile

Exercise: Quasar

Date: 18/08/2020

Compromise & Exfiltration

compromise

Quasar Functions

console remotefiles quasar-rs-ftp

What was the name of the malicious document?

What was the name of the malware?

What is the temporary file name?

Where does the malware persist?

What is the MD5 hash for the malware (binary)?

How does the malware automatically start?

What IPv4 address and port does the malware connect to?

What domains are contacted?

What commands are invoked by the attacker on DC2 host?

What is the name of the file created on DC-2?

What did the attacker use the file created on DC-2 for?

What commands are invoked by the attacker on DC1 host?

What was the purpose of invoking the process starting with ‘v’?

What was the adversary IP address used to connect via FTP?

What folder was used for staging?

List the MITRE ATT&CK TTPs

Produce a timeline of the events

timeline

Document any limitations or gaps or issues

Document any attacker mistakes

Code Review

Quasar is available in code form Quasar GitHub. Inspecting the code confirms the presence of hardcoded domains: ioc1 ioc2

References

The following advisories may assist: