General

  • Target

    Uni.bat

  • Size

    272KB

  • Sample

    240613-s8r7vsygrr

  • MD5

    e68a50bde7ca4662d9f6a4b47b854e31

  • SHA1

    3fd554edfe28d2989bcd13476bc1f6505e058c35

  • SHA256

    110e64b6f140426700075c840eeaa023dd9447ff7d827bc919345cb572003fae

  • SHA512

    e5006fe158ea0cf00d95433060fff4ea9a20f14b115c52f2c15ddb7e9408525ed8247cc6311416f7123812c4dc8d27a51b32ce4086586053f942653e4dd477ab

  • SSDEEP

    6144:6kYbd/34dS3Tpy2Iq7T1qPYB4b3CtqR+w/2FuMhxeusG9QXQ7+:442DUAB4bSthacuMhVsEIx

Malware Config

Extracted

Family

quasar

Version

3.0.1

Botnet

Nigga

C2

runderscore00-37568.portmap.host:37568

Mutex

QSR_MUTEX_Jk9UNyFvu6bseKbzj7

Attributes
  • encryption_key

    B2UIOEXN1qthFBcvL0Vb

  • install_name

    $sxr-powershell.exe

  • log_directory

    $sxr-Logs

  • reconnect_delay

    3000

  • startup_key

    Powershell

  • subdirectory

    $sxr-seroxen2

Targets

    • Target

      Uni.bat

    • Size

      272KB

    • MD5

      e68a50bde7ca4662d9f6a4b47b854e31

    • SHA1

      3fd554edfe28d2989bcd13476bc1f6505e058c35

    • SHA256

      110e64b6f140426700075c840eeaa023dd9447ff7d827bc919345cb572003fae

    • SHA512

      e5006fe158ea0cf00d95433060fff4ea9a20f14b115c52f2c15ddb7e9408525ed8247cc6311416f7123812c4dc8d27a51b32ce4086586053f942653e4dd477ab

    • SSDEEP

      6144:6kYbd/34dS3Tpy2Iq7T1qPYB4b3CtqR+w/2FuMhxeusG9QXQ7+:442DUAB4bSthacuMhVsEIx

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Tasks