General

  • Target

    XWorm V3.1.exe

  • Size

    7.0MB

  • Sample

    230319-zv3vrscb7x

  • MD5

    e0b3a2c3df9a18ad71e1293a3195cadf

  • SHA1

    f48a0d2c47f1db77457e894d4e72bb3ddd6b0691

  • SHA256

    7786135b3cd7225c0fd83b1fc05efb702ae015d124326dfb4947d4e2addaab69

  • SHA512

    b2c091d50902ed44f7de80ec84bff8894bee0fce5ac0e53536048ae8d6cfc0c719771dab7ae5f585cd608fe86f50d8c25219faa7daef7720d0f2b557a9af972e

  • SSDEEP

    196608:Nn1Q6B/XKUDz9NoUXJzUWi7MYjBVvo5/km:N1FlaU/9NZXJZinjB9oxj

Malware Config

Extracted

Family

gozi

Extracted

Family

quasar

Version

1.4.0

Botnet

v15.5.0 | C5Patcher

C2

blue-fog-95386.pktriot.net:22781

Mutex

41e6efe6-1856-4679-a9f1-4f99d8236ac2

Attributes
  • encryption_key

    313B7CC078756BA4565679A48877BC516AC41AF4

  • install_name

    .exe

  • log_directory

    $sxr-Logs

  • reconnect_delay

    3000

  • startup_key

    $sxr-seroxen

Targets

    • Target

      XWorm V3.1.exe

    • Size

      7.0MB

    • MD5

      e0b3a2c3df9a18ad71e1293a3195cadf

    • SHA1

      f48a0d2c47f1db77457e894d4e72bb3ddd6b0691

    • SHA256

      7786135b3cd7225c0fd83b1fc05efb702ae015d124326dfb4947d4e2addaab69

    • SHA512

      b2c091d50902ed44f7de80ec84bff8894bee0fce5ac0e53536048ae8d6cfc0c719771dab7ae5f585cd608fe86f50d8c25219faa7daef7720d0f2b557a9af972e

    • SSDEEP

      196608:Nn1Q6B/XKUDz9NoUXJzUWi7MYjBVvo5/km:N1FlaU/9NZXJZinjB9oxj

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Async RAT payload

    • Executes dropped EXE

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks