General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/2DDghj
Resource
win10-20230220-en
windows10-1703-x64
27 signatures
1800 seconds
Behavioral task
behavioral2
Sample
https://gofile.io/d/2DDghj
Resource
win10v2004-20230220-en
windows10-2004-x64
16 signatures
1800 seconds
Behavioral task
behavioral3
Sample
https://gofile.io/d/2DDghj
Resource
macos-20220504-en
macos-10.15-amd64
0 signatures
1800 seconds
Malware Config
Extracted
Family
quasar
Version
1.4.0
Botnet
v15.5.4 | SeroXen
C2
us-east-63815.packetriot.net:22685
Mutex
480ee734-a00e-4d8c-8579-704f4f60da38
Attributes
-
encryption_key
F622E4B012DB6D330923BFB7D9C9757C12AB59FD
-
install_name
.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
$sxr-seroxen
Targets
-
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext