| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1555 | 从密码存储中获取凭证 |
QuasarRAT can obtain passwords from common FTP clients.[1][2] |
|
| .003 | Credentials from Web Browsers |
QuasarRAT can obtain passwords from common web browsers.[1][2] |
||
| Enterprise | T1005 | 从本地系统获取数据 |
QuasarRAT can retrieve files from compromised client machines.[5] |
|
| Enterprise | T1090 | 代理 |
QuasarRAT can communicate over a reverse proxy using SOCKS5.[1][2] |
|
| Enterprise | T1112 | 修改注册表 |
QuasarRAT has a command to edit the Registry on the victim’s machine.[1][5] |
|
| Enterprise | T1573 | .001 | 加密通道: Symmetric Cryptography |
QuasarRAT uses AES with a hardcoded pre-shared key to encrypt network communication.[1][2][5] |
| Enterprise | T1547 | .001 | 启动或登录自动启动执行: Registry Run Keys / Startup Folder |
If the QuasarRAT client process does not have administrator privileges it will add a registry key to |
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
QuasarRAT can launch a remote shell to execute commands on the victim’s machine.[1][5] |
| Enterprise | T1552 | .001 | 未加密凭证: Credentials In Files | |
| Enterprise | T1548 | .002 | 滥用权限提升控制机制: Bypass User Account Control |
QuasarRAT can generate a UAC pop-up Window to prompt the target user to run a command as the administrator.[5] |
| Enterprise | T1614 | 系统位置发现 |
QuasarRAT can determine the country a victim host is located in.[5] |
|
| Enterprise | T1082 | 系统信息发现 |
QuasarRAT can gather system information from the victim’s machine including the OS type.[1] |
|
| Enterprise | T1033 | 系统所有者/用户发现 | ||
| Enterprise | T1016 | 系统网络配置发现 |
QuasarRAT has the ability to enumerate the Wide Area Network (WAN) IP through requests to ip-api[.]com, freegeoip[.]net, or api[.]ipify[.]org observed with user-agent string |
|
| Enterprise | T1125 | 视频捕获 | ||
| Enterprise | T1105 | 输入工具传输 |
QuasarRAT can download files to the victim’s machine and execute them.[1][2] |
|
| Enterprise | T1056 | .001 | 输入捕获: Keylogging | |
| Enterprise | T1021 | .001 | 远程服务: Remote Desktop Protocol |
QuasarRAT has a module for performing remote desktop access.[1][2] |
| Enterprise | T1564 | .001 | 隐藏伪装: Hidden Files and Directories |
QuasarRAT has the ability to set file attributes to "hidden" to hide files from the compromised user's view in Windows File Explorer.[5] |
| .003 | 隐藏伪装: Hidden Window |
QuasarRAT can hide process windows and make web requests invisible to the compromised user. Requests marked as invisible have been sent with user-agent string |
||
| Enterprise | T1095 | 非应用层协议 | ||
| Enterprise | T1571 | 非标准端口 |
QuasarRAT can use port 4782 on the compromised host for TCP callbacks.[5] |
|
| Enterprise | T1053 | .005 | 预定任务/作业: Scheduled Task |
QuasarRAT contains a .NET wrapper DLL for creating and managing scheduled tasks for maintaining persistence upon reboot.[2][5] |
| Enterprise | T1553 | .002 | 颠覆信任控制: Code Signing |
A QuasarRAT .dll file is digitally signed by a certificate from AirVPN.[2] |
| ID | Name | References |
|---|---|---|
| G0040 | Patchwork | |
| G0140 | LazyScripter | |
| G0078 | Gorgon Group | |
| G0094 | Kimsuky | |
| G0045 | menuPass | |
| G0135 | BackdoorDiplomacy |