General
-
Target
https://github.com/copper2210/Gorilla-Runners-Revamped/blob/main/Gorilla%20Runners.7z
-
Sample
240517-a925cahh3w
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/copper2210/Gorilla-Runners-Revamped/blob/main/Gorilla%20Runners.7z
Resource
win10-20240404-en
windows10-1703-x64
18 signatures
150 seconds
Malware Config
Extracted
Family
quasar
Version
3.1.5
Botnet
Gorilla Runners
C2
147.185.221.19:54192
Mutex
$Sxr-ItGMyLehmAHOIcQYfY
Attributes
-
encryption_key
BRH7FcRHhtfWieLCEUX3
-
install_name
$sxr-powershell.exe
-
log_directory
$SXR-LOGS
-
reconnect_delay
3000
-
startup_key
$sxr-powershell
-
subdirectory
$sxr-seroxen2
Targets
-
-
Target
https://github.com/copper2210/Gorilla-Runners-Revamped/blob/main/Gorilla%20Runners.7z
Score10/10-
Quasar payload
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-