General

  • Target

    tKs7nbI.bat

  • Size

    1003KB

  • Sample

    240530-vbqzmsec51

  • MD5

    a9c91096bbb037810b2cc22d81e8d95d

  • SHA1

    ea3929bc88ca4c0c943b3f0522cacfbbb9de6b4d

  • SHA256

    cc31f9abb4a23b7d94d6f17b23351d1ee4302fa779b627aa35c24dbf17ec7a5c

  • SHA512

    ed4cba44fed44fbcc381e01d83d42e0ed667bd0922170db56a52a041e3557380b48e84b161cc389cdf69c8dd86c873b31828798acfc738e6ce8a89fa86b2ca64

  • SSDEEP

    24576:Xh3RydALrdPnUJBuvYf0xlLpv33P5ShWAceU7:pgdALFnduOvHPIw7

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    3000

Extracted

Family

quasar

Version

3.1.5

Botnet

v3.1.5 | SeroXen

C2

runderscore00-25501.portmap.host:25501

Mutex

$Sxr-jy6vh8CtEJL5ceZuIb

Attributes
  • encryption_key

    RqhtG6daCh0jt3avVuLQ

  • install_name

    $77-powershell.exe

  • log_directory

    $77-Logs

  • reconnect_delay

    3000

  • startup_key

    $77-Powershell

  • subdirectory

    $77-SeroXen

Targets

    • Target

      tKs7nbI.bat

    • Size

      1003KB

    • MD5

      a9c91096bbb037810b2cc22d81e8d95d

    • SHA1

      ea3929bc88ca4c0c943b3f0522cacfbbb9de6b4d

    • SHA256

      cc31f9abb4a23b7d94d6f17b23351d1ee4302fa779b627aa35c24dbf17ec7a5c

    • SHA512

      ed4cba44fed44fbcc381e01d83d42e0ed667bd0922170db56a52a041e3557380b48e84b161cc389cdf69c8dd86c873b31828798acfc738e6ce8a89fa86b2ca64

    • SSDEEP

      24576:Xh3RydALrdPnUJBuvYf0xlLpv33P5ShWAceU7:pgdALFnduOvHPIw7

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks