

Quasar RAT aka CinaRAT – Active IOCs
February 5, 2025
CISA Warns of Four Actively Exploited Security Flaws in KEV Catalog
February 5, 2025
Quasar RAT aka CinaRAT – Active IOCs
February 5, 2025
CISA Warns of Four Actively Exploited Security Flaws in KEV Catalog
February 5, 2025Severity
High
Analysis Summary
MassLogger, a .NET credential stealer, is a keylogger and stealer malware. MassLogger's prime objective is data extraction or information theft, such as bank account and/or credit card details. This malware was published in April 2020 and was offered for a moderate price on underground forums with a few license choices. It starts with a launcher that employs rudimentary anti-debugging techniques that may be readily bypassed if detected. Eventually, the first stage loader XOR decrypts the second stage assembly, which then decrypts, loads, and executes the final MassLogger payload.
MassLogger targets a wide range of apps to steal login credentials and other sensitive information. It obtains and exfiltrates user credentials from a variety of sources, including Microsoft Outlook, Google Chrome, Mozilla Firefox, and instant messengers.
Impact
- Financial Theft
- Information Theft
Indicators of Compromise
MD5
d9a9fc9b5bd0824305d138bc5d9607a2
bca0036abba7a25a547019716284775f
eb763b8c50831da4f508a499816e3118
5d7163249791d26403e79f36728ba0c5
84a611c93207a548ef497423fe4a4015
e6c6541c95da090df8c0124b7c9611f4
SHA-256
2b23a643932b66238ce745c1bc384c9bda19f47c130fb3434d92e69e98203cd5
9563e215a0e8347722a008f6b0797078d8096d73607708aaeaac51b3736469bb
baa5f55f0f4e35aa775f2237b524a7d06b366675fb9b63e02d4e822f2f422405
cb9479c3ab02cd405569e6db908925e4f4823eb57a270364fa6cd1d777bab26c
8c4aa3de23af80966c9a5c8911daebe824bb252bc659a548535e6cf94b2d9ed9
06b93c4d0c315b97144c799c38317a4be3fb2eb238b7fd1d5bb9941acc1da19c
SHA1
8409970d35b38667eda5c1fdf899182fec0c86ed
c379d69eb9a586a0907fa75887d4a10bff24d4c6
16e93e476f14d9ad05cf8e885304f149f2d8508a
30956c06eaa65db2474e8bc2b62ea3351a06b837
9376a91dced0814f7f5a6b5014a2c67e02528786
b7ee8f9dcd72bfa2faa065ede34714153bcffcb7
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open " links and attachments received from unknown sources/senders.
- Ensure that general security policies are employed including implementing strong passwords, correct configurations, and proper administration security policies.
- Limit access to administrative accounts and portals to only relevant personnel and make sure they are not publicly accessible.
- Patch and upgrade any platforms and software on time and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.