General

  • Target

    downloader.exe

  • Size

    30.1MB

  • Sample

    241202-nx72qasndv

  • MD5

    b4ac244eb3169d45369fda7755b57aaa

  • SHA1

    a53bab23eb3cf42cc2fa7c6d5930fedd9256598d

  • SHA256

    0d38abd43b866126e6a2a8ee78aba24054efdb35c5246873e7a1b4ff8bf2b73f

  • SHA512

    fd959e643dba2cc352c5aad20f71cbd2cf6d01cfe6c4b88f5a960d983a1967a4a5c49650da99f28c44210d82c4b873755c486ffb93c373ea242c13b3bafb2184

  • SSDEEP

    393216:R8oimu7izBxR3QRzhzvQ99Sq8lu0q5tDJKoWSxJGBL7almo+AJCcLKAz:R9w9wD5xUelbJCcr

Malware Config

Extracted

Family

xworm

Version

3.1

C2

83.38.24.1:1603

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    USB.exe

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

arialHdgr-58896.portmap.host:58896

Mutex

2cecb63d-fdd8-4df2-9a01-6292b8e28a97

Attributes
  • encryption_key

    54BC8ACC512CFAA23B60AF87FED03E51AE199A20

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      downloader.exe

    • Size

      30.1MB

    • MD5

      b4ac244eb3169d45369fda7755b57aaa

    • SHA1

      a53bab23eb3cf42cc2fa7c6d5930fedd9256598d

    • SHA256

      0d38abd43b866126e6a2a8ee78aba24054efdb35c5246873e7a1b4ff8bf2b73f

    • SHA512

      fd959e643dba2cc352c5aad20f71cbd2cf6d01cfe6c4b88f5a960d983a1967a4a5c49650da99f28c44210d82c4b873755c486ffb93c373ea242c13b3bafb2184

    • SSDEEP

      393216:R8oimu7izBxR3QRzhzvQ99Sq8lu0q5tDJKoWSxJGBL7almo+AJCcLKAz:R9w9wD5xUelbJCcr

    • Detect Xworm Payload

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks