General

  • Target

    Seron.exe

  • Size

    3.1MB

  • Sample

    241227-1ldpys1jbl

  • MD5

    60ae8e68cd5cac022863c76ef85f45c0

  • SHA1

    effc67a7495954ebf0454e9dfde6873d68b91ab9

  • SHA256

    4fda59b0a26d2f592d55df2fbfba352b2bb9b9509215b87869f05cbfe4f32b27

  • SHA512

    6132ea7e8e5800d74fa972fc0623e65a5f7834efa9140c331d6f009af02a9c0e8f7b90c6733e1da655234bd89b6582339e9f8f45bb80f141123972df641a20ad

  • SSDEEP

    49152:rvelL26AaNeWgPhlmVqvMQ7XSKOBxPESEDk/iZLoGdFzMKTHHB72eh2NT:rvOL26AaNeWgPhlmVqkQ7XSKQxwp

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Seron

C2

nigeboc465-58875.portmap.host:58875

Mutex

eb8602ec-8a0d-4322-b9a0-544571be5a2d

Attributes
  • encryption_key

    8BD9150EEC3DA71ED82080D7AEB7C165A58C889F

  • install_name

    f8mk7ZGwVUpulm.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    f8mk7ZGwVUpulm

  • subdirectory

    SubDir

Targets

    • Target

      Seron.exe

    • Size

      3.1MB

    • MD5

      60ae8e68cd5cac022863c76ef85f45c0

    • SHA1

      effc67a7495954ebf0454e9dfde6873d68b91ab9

    • SHA256

      4fda59b0a26d2f592d55df2fbfba352b2bb9b9509215b87869f05cbfe4f32b27

    • SHA512

      6132ea7e8e5800d74fa972fc0623e65a5f7834efa9140c331d6f009af02a9c0e8f7b90c6733e1da655234bd89b6582339e9f8f45bb80f141123972df641a20ad

    • SSDEEP

      49152:rvelL26AaNeWgPhlmVqvMQ7XSKOBxPESEDk/iZLoGdFzMKTHHB72eh2NT:rvOL26AaNeWgPhlmVqkQ7XSKQxwp

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks