General

  • Target

    507a4c384bb2f8f827f9afea86bdaf90_NeikiAnalytics

  • Size

    788KB

  • Sample

    240515-azvbrage3y

  • MD5

    507a4c384bb2f8f827f9afea86bdaf90

  • SHA1

    42e798d63d23d3fe3d0fb9e948fa0862bec17460

  • SHA256

    ae3da43fa390f80dea2ff13616bad76ad00e18fabc0875f536d97b0a63ddc834

  • SHA512

    54d2374bf8fdda4f3a238dfe2a20a0a0ccb7b5417c0191d5309271b38705abbad1a40b70c2e620fc941d87e78e3b94e2c72f759d3b2c74c88a3fddef9cefdf37

  • SSDEEP

    12288:3SqIiIgwPBOchBS4SYTzmTxA8/CRrETd9n0B0r90X31CW2GvdwaAElhB8XD:3SntOR4SujZ4Z0B2ClyadnB8XD

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

SeroXen

C2

even-lemon.gl.at.ply.gg:33587

Mutex

$Sxr-8OwXzJgLJPVSViGjpN

Attributes
  • encryption_key

    5BZWG9VR5yDqvatFtIaG

  • install_name

    $sxr-powershell.exe

  • log_directory

    $SXR-LOGS

  • reconnect_delay

    3000

  • startup_key

    $sxr-powershell

  • subdirectory

    $sxr-seroxen2

Targets

    • Target

      507a4c384bb2f8f827f9afea86bdaf90_NeikiAnalytics

    • Size

      788KB

    • MD5

      507a4c384bb2f8f827f9afea86bdaf90

    • SHA1

      42e798d63d23d3fe3d0fb9e948fa0862bec17460

    • SHA256

      ae3da43fa390f80dea2ff13616bad76ad00e18fabc0875f536d97b0a63ddc834

    • SHA512

      54d2374bf8fdda4f3a238dfe2a20a0a0ccb7b5417c0191d5309271b38705abbad1a40b70c2e620fc941d87e78e3b94e2c72f759d3b2c74c88a3fddef9cefdf37

    • SSDEEP

      12288:3SqIiIgwPBOchBS4SYTzmTxA8/CRrETd9n0B0r90X31CW2GvdwaAElhB8XD:3SntOR4SujZ4Z0B2ClyadnB8XD

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks