Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. QuasarRAT

QuasarRAT

QuasarRAT is an open-source, remote access tool that has been publicly available on GitHub since at least 2014.QuasarRAT is developed in the C# language.[1][2]

ID: S0262
Associated Software: xRAT
Type: TOOL
Platforms: Windows
Contributors: Kyaw Pyiyt Htet, @KyawPyiytHtet
Version: 2.1
Created: 17 October 2018
Last Modified: 07 May 2024

Associated Software Descriptions

NameDescription
xRAT

[3][4]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1548.002Abuse Elevation Control Mechanism:Bypass User Account Control

QuasarRAT can generate a UAC pop-up Window to prompt the target user to run a command as the administrator.[5]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

If theQuasarRAT client process does not have administrator privileges it will add a registry key toHKCU\Software\Microsoft\Windows\CurrentVersion\Run for persistence.[1][5]

EnterpriseT1059.003Command and Scripting Interpreter:Windows Command Shell

QuasarRAT can launch a remote shell to execute commands on the victim’s machine.[1][5]

EnterpriseT1555Credentials from Password Stores

QuasarRAT can obtain passwords from common FTP clients.[1][2]

.003Credentials from Web Browsers

QuasarRAT can obtain passwords from common web browsers.[1][2]

EnterpriseT1005Data from Local System

QuasarRAT can retrieve files from compromised client machines.[5]

EnterpriseT1573.001Encrypted Channel:Symmetric Cryptography

QuasarRAT uses AES with a hardcoded pre-shared key to encrypt network communication.[1][2][5]

EnterpriseT1564.001Hide Artifacts:Hidden Files and Directories

QuasarRAT has the ability to set file attributes to "hidden" to hide files from the compromised user's view in Windows File Explorer.[5]

.003Hide Artifacts:Hidden Window

QuasarRAT can hide process windows and make web requests invisible to the compromised user. Requests marked as invisible have been sent with user-agent stringMozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/7046A194A thoughQuasarRAT can only be run on Windows systems.[5]

EnterpriseT1105Ingress Tool Transfer

QuasarRAT can download files to the victim’s machine and execute them.[1][2]

EnterpriseT1056.001Input Capture:Keylogging

QuasarRAT has a built-in keylogger.[1][2]

EnterpriseT1112Modify Registry

QuasarRAT has a command to edit the Registry on the victim’s machine.[1][5]

EnterpriseT1095Non-Application Layer Protocol

QuasarRAT can use TCP for C2 communication.[5]

EnterpriseT1571Non-Standard Port

QuasarRAT can use port 4782 on the compromised host for TCP callbacks.[5]

EnterpriseT1090Proxy

QuasarRAT can communicate over a reverse proxy using SOCKS5.[1][2]

EnterpriseT1021.001Remote Services:Remote Desktop Protocol

QuasarRAT has a module for performing remote desktop access.[1][2]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

QuasarRAT contains a .NET wrapper DLL for creating and managing scheduled tasks for maintaining persistence upon reboot.[2][5]

EnterpriseT1553.002Subvert Trust Controls:Code Signing

AQuasarRAT .dll file is digitally signed by a certificate from AirVPN.[2]

EnterpriseT1082System Information Discovery

QuasarRAT can gather system information from the victim’s machine including the OS type.[1]

EnterpriseT1614System Location Discovery

QuasarRAT can determine the country a victim host is located in.[5]

EnterpriseT1016System Network Configuration Discovery

QuasarRAT has the ability to enumerate the Wide Area Network (WAN) IP through requests to ip-api[.]com, freegeoip[.]net, or api[.]ipify[.]org observed with user-agent stringMozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0.[5]

EnterpriseT1033System Owner/User Discovery

QuasarRAT can enumerate the username and account type.[5]

EnterpriseT1552.001Unsecured Credentials:Credentials In Files

QuasarRAT can obtain passwords from FTP clients.[1][2]

EnterpriseT1125Video Capture

QuasarRAT can perform webcam viewing.[1][2]

Groups That Use This Software

References

  1. Falcone, R., et al. (2018, August 02). The Gorgon Group: Slithering Between Nation State and Cybercrime. Retrieved August 7, 2018.
  2. Mandiant. (2024, March 14). APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations. Retrieved May 3, 2024.
  3. Mandiant. (n.d.). APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations. Retrieved October 14, 2024.
  4. United States District Court Southern District of New York (USDC SDNY) . (2018, December 17). United States of America v. Zhu Hua and Zhang Shilong. Retrieved April 17, 2019.
  5. Symantec. (2020, November 17). Japan-Linked Organizations Targeted in Long-Running and Sophisticated Attack Campaign. Retrieved December 17, 2020.
  6. Adam Burgher. (2021, June 10). BackdoorDiplomacy: Upgrading from Quarian to Turian. Retrieved September 1, 2021
×

[8]ページ先頭

©2009-2026 Movatter.jp