General

  • Target

    Space Paid v2.bat

  • Size

    586KB

  • Sample

    240611-y6bpzszgpg

  • MD5

    a5c3bef843c9d6022db92547f32855d1

  • SHA1

    816338da7ee45d496f39bbd36c6b106ee0b3e2fe

  • SHA256

    ef70e618b652c777b3b2e589d1381bda6c7e49e7f2510334257c1e2add139045

  • SHA512

    0e44e31275a89f29388418538f57cb3437ad1d24f08d0c3c7d85a1a906c5b212024f2960237b66e3f2838923497e82f198ad8c4ed0b34548190e6db03504f1bd

  • SSDEEP

    12288:aAjiyOzsNdeAKQ1pCTt/dMpEncClHel1wF2sEyutyF7Pd8CM:aA+yOYHlKopC/62caqT+d8R

Malware Config

Extracted

Family

quasar

Version

3.0.0

Botnet

Slave

C2

runderscore00-63294.portmap.host:63294

Mutex

QSR_MUTEX_KJSikjqkjc5AYGioTK

Attributes
  • encryption_key

    bU53s6xktYcC9aQVfouV

  • install_name

    $sxr-powershell.exe

  • log_directory

    $sxr-Logs

  • reconnect_delay

    3000

  • startup_key

    Powershell

  • subdirectory

    $sxr-seroxen2

Targets

    • Target

      Space Paid v2.bat

    • Size

      586KB

    • MD5

      a5c3bef843c9d6022db92547f32855d1

    • SHA1

      816338da7ee45d496f39bbd36c6b106ee0b3e2fe

    • SHA256

      ef70e618b652c777b3b2e589d1381bda6c7e49e7f2510334257c1e2add139045

    • SHA512

      0e44e31275a89f29388418538f57cb3437ad1d24f08d0c3c7d85a1a906c5b212024f2960237b66e3f2838923497e82f198ad8c4ed0b34548190e6db03504f1bd

    • SSDEEP

      12288:aAjiyOzsNdeAKQ1pCTt/dMpEncClHel1wF2sEyutyF7Pd8CM:aA+yOYHlKopC/62caqT+d8R

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks