General

  • Target

    WiKxtRl.bat

  • Size

    272KB

  • Sample

    240614-tkm4nsxfkg

  • MD5

    f8c89040f07e6c7a606aff9fb0290cce

  • SHA1

    4fb4fa46db09a97e86211e957c57f79329f337db

  • SHA256

    2f878f17890e54a4592aa7b9cd78f5b8d44e0254cf85744d94590200bed8d125

  • SHA512

    aebb8f52e159859a949ab73c6732bb33dc97fe78b91f88a615dd369e53c717a10a1e1270bb82f25d3676b707a0d257003dc8e1b78693483d23cc9d2f25b64cd1

  • SSDEEP

    6144:uI+T8bqc6S8uX/PjYPH8LJWGwe1EhBdm0x3UfRbx:uzT2v78Sy849e1sL2RF

Malware Config

Extracted

Family

quasar

Version

3.0.1

Botnet

Home

C2

runderscore00-37568.portmap.host:37568

Mutex

QSR_MUTEX_7eiwpVBqV4jgLShS0s

Attributes
  • encryption_key

    cxiUIqKRDWrc2NXNxx7H

  • install_name

    $sxr-powershell.exe

  • log_directory

    $sxr-Logs

  • reconnect_delay

    3000

  • startup_key

    Powershell

  • subdirectory

    $sxr-seroxen2

Targets

    • Target

      WiKxtRl.bat

    • Size

      272KB

    • MD5

      f8c89040f07e6c7a606aff9fb0290cce

    • SHA1

      4fb4fa46db09a97e86211e957c57f79329f337db

    • SHA256

      2f878f17890e54a4592aa7b9cd78f5b8d44e0254cf85744d94590200bed8d125

    • SHA512

      aebb8f52e159859a949ab73c6732bb33dc97fe78b91f88a615dd369e53c717a10a1e1270bb82f25d3676b707a0d257003dc8e1b78693483d23cc9d2f25b64cd1

    • SSDEEP

      6144:uI+T8bqc6S8uX/PjYPH8LJWGwe1EhBdm0x3UfRbx:uzT2v78Sy849e1sL2RF

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Discovery

Remote System Discovery

1
T1018

Tasks