General

  • Target

    Uni.exe

  • Size

    409KB

  • Sample

    240529-x5x16afh57

  • MD5

    78f15f52152da9355915d646d5f4f1e6

  • SHA1

    514623af0d40968570977bb0993bc775b5dcb6cb

  • SHA256

    6526c22d7ce386857149b6b5615c1c24cab7691496a1d3d849ead5d3e0b7b0c7

  • SHA512

    13752ce045c2f7f0be187a6688b4032579fce7f17e8b77f66f192ee472aa58e60a1c5ea34dd85cb704e621afe4f228df880536159a7a907c41fbfeba3180a87d

  • SSDEEP

    12288:ypbJjGukXuXQiwWlaJKwuKOASp2uLBUS:2VauOWERPIpB

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

SeroXen

C2

panel-slave.gl.at.ply.gg:57059

panel-slave.gl.at.ply.gg:27892

Mutex

$Sxr-rpL8EItHN3pqIQQVy2

Attributes
  • encryption_key

    PXEHWy52mqnqS2Hd39SK

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    SeroXen

  • subdirectory

    SubDir

Targets

    • Target

      Uni.exe

    • Size

      409KB

    • MD5

      78f15f52152da9355915d646d5f4f1e6

    • SHA1

      514623af0d40968570977bb0993bc775b5dcb6cb

    • SHA256

      6526c22d7ce386857149b6b5615c1c24cab7691496a1d3d849ead5d3e0b7b0c7

    • SHA512

      13752ce045c2f7f0be187a6688b4032579fce7f17e8b77f66f192ee472aa58e60a1c5ea34dd85cb704e621afe4f228df880536159a7a907c41fbfeba3180a87d

    • SSDEEP

      12288:ypbJjGukXuXQiwWlaJKwuKOASp2uLBUS:2VauOWERPIpB

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Tasks