General

  • Target

    Seron.exe

  • Size

    3.1MB

  • Sample

    241225-3hk1za1mhv

  • MD5

    3d3c3272d41c20dd8a12826e75af36a9

  • SHA1

    33f41b11b07bb5bfd07b6eefc1df6b898e1d052f

  • SHA256

    e54a374dac36e9aa6ca9cfcb32b2828bdff03411259adddbbd3a032465843b52

  • SHA512

    3700538f7796f5254c0c5ef7be1f43e117ad65af2836dc2d6ec5faaa99651b4796bab77b53118e5ce24032540a5674df7027709a762a305b6007c9126ca417ef

  • SSDEEP

    49152:DvqlL26AaNeWgPhlmVqvMQ7XSKDS8wbR4LoGdzTHHB72eh2NT:DvSL26AaNeWgPhlmVqkQ7XSKDS83

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Seron

C2

a4hrb4kc9z-59858.portmap.host:59858

Mutex

2ac9af47-8868-455d-8ff0-aea73f3bb28f

Attributes
  • encryption_key

    8BD9150EEC3DA71ED82080D7AEB7C165A58C889F

  • install_name

    vn3gqb4ZDoPYX3.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    sKnqGpLs82z7bl

  • subdirectory

    SubDir

Targets

    • Target

      Seron.exe

    • Size

      3.1MB

    • MD5

      3d3c3272d41c20dd8a12826e75af36a9

    • SHA1

      33f41b11b07bb5bfd07b6eefc1df6b898e1d052f

    • SHA256

      e54a374dac36e9aa6ca9cfcb32b2828bdff03411259adddbbd3a032465843b52

    • SHA512

      3700538f7796f5254c0c5ef7be1f43e117ad65af2836dc2d6ec5faaa99651b4796bab77b53118e5ce24032540a5674df7027709a762a305b6007c9126ca417ef

    • SSDEEP

      49152:DvqlL26AaNeWgPhlmVqvMQ7XSKDS8wbR4LoGdzTHHB72eh2NT:DvSL26AaNeWgPhlmVqkQ7XSKDS83

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks