General

  • Target

    Client-built.exe

  • Size

    3.1MB

  • Sample

    240601-3m57psah9z

  • MD5

    dd2f556310eccb91f1b3a3b3d7c52c44

  • SHA1

    c0032a0894ea23bba4dc36e37dd26eca25e1ac81

  • SHA256

    3797626bb8fb9703283002f9fe59c8e0b55292a180efdae1b8b3faace9f6c899

  • SHA512

    79a11a3154894485cec74c202105653deb1c53d19ef26f1b33214fda58e52a01774f3c6d332c8068a94c08ffa2afc02c8dca8d2ad10c2d98d219792ab019f1a3

  • SSDEEP

    49152:zvelL26AaNeWgPhlmVqvMQ7XSKOqRJ6kbR3LoGd9uTHHB72eh2NT:zvOL26AaNeWgPhlmVqkQ7XSKOqRJ6u

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

FUD

C2

runderscore00-61208.portmap.host:61208

Mutex

41104e3a-44c7-4cb0-8bde-1a3c82e695fa

Attributes
  • encryption_key

    0185F96AF587188E173301C437AB89C8912A9718

  • install_name

    $sxr-powershell.exe

  • log_directory

    $sxr-Logs

  • reconnect_delay

    3000

  • startup_key

    Powershell

  • subdirectory

    $sxr-seroxen2

Targets

    • Target

      Client-built.exe

    • Size

      3.1MB

    • MD5

      dd2f556310eccb91f1b3a3b3d7c52c44

    • SHA1

      c0032a0894ea23bba4dc36e37dd26eca25e1ac81

    • SHA256

      3797626bb8fb9703283002f9fe59c8e0b55292a180efdae1b8b3faace9f6c899

    • SHA512

      79a11a3154894485cec74c202105653deb1c53d19ef26f1b33214fda58e52a01774f3c6d332c8068a94c08ffa2afc02c8dca8d2ad10c2d98d219792ab019f1a3

    • SSDEEP

      49152:zvelL26AaNeWgPhlmVqvMQ7XSKOqRJ6kbR3LoGd9uTHHB72eh2NT:zvOL26AaNeWgPhlmVqkQ7XSKOqRJ6u

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks