General

  • Target

    PAR4DISE.bat

  • Size

    11.6MB

  • Sample

    230313-rp23aacg7x

  • MD5

    fe3925c1f7ab685f15bac7af0ce98ede

  • SHA1

    91e9831c81d150ba337bc03dbe072e7a58403343

  • SHA256

    44091a677e3d6fa0e0c575856a1431578f5755ed98c12f35429905e43da59be0

  • SHA512

    18c9cd2d7444f8bd09825a2c027a662fc6a027bd9ebaf8b6bb8ada8d8b2977f67f1827a5fa73b151ff58e5fce51f42f51987f8b5dcc78795a3e2df69543ec9fd

  • SSDEEP

    49152:siq+kJMxngSl5DHn7UbM+K7ipjPWQB2VBWdIpmqu8Modtu7CWO2e3BifetlEzKPf:7

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

v15.5.0 | SeroXen

C2

181.ip.ply.gg:9697

Mutex

c33f6306-42ab-4623-a4a9-41a3cc67df21

Attributes
  • encryption_key

    5EAAD3FD254A0F71348B8F552A258BF4D0766627

  • install_name

    .exe

  • log_directory

    $sxr-Logs

  • reconnect_delay

    3000

  • startup_key

    $sxr-seroxen

Targets

    • Target

      PAR4DISE.bat

    • Size

      11.6MB

    • MD5

      fe3925c1f7ab685f15bac7af0ce98ede

    • SHA1

      91e9831c81d150ba337bc03dbe072e7a58403343

    • SHA256

      44091a677e3d6fa0e0c575856a1431578f5755ed98c12f35429905e43da59be0

    • SHA512

      18c9cd2d7444f8bd09825a2c027a662fc6a027bd9ebaf8b6bb8ada8d8b2977f67f1827a5fa73b151ff58e5fce51f42f51987f8b5dcc78795a3e2df69543ec9fd

    • SSDEEP

      49152:siq+kJMxngSl5DHn7UbM+K7ipjPWQB2VBWdIpmqu8Modtu7CWO2e3BifetlEzKPf:7

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Async RAT payload

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks