General

  • Target

    Seron_protected.exe

  • Size

    2.3MB

  • Sample

    241228-lcy7zaxkex

  • MD5

    a1e7539d32cd463c86540e00607e274b

  • SHA1

    537b182c080ddd6fa8e89b31d67297abf7aef554

  • SHA256

    828b9961731797b0a487f095d9980d3771599eb54feab35d1e856b925558e61a

  • SHA512

    33c8ff00732e04a360c57aef401467f54a649563c5820c81c19b5de1607102bd9c29c65ca4f8c914885a0031b0c415339efa01122fbda58e17d8ff632d48b567

  • SSDEEP

    49152:M55We0VQ+028J5gyUjjp5bCt7S275L6MP/J2H76gYSt98H9Y08ChNB/n:M55We0VCN6jjp5bC5Ft6MX4H76XStCdz

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Seron

C2

nigeboc465-58875.portmap.host:58875

Mutex

eb8602ec-8a0d-4322-b9a0-544571be5a2d

Attributes
  • encryption_key

    8BD9150EEC3DA71ED82080D7AEB7C165A58C889F

  • install_name

    f8mk7ZGwVUpulm.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    f8mk7ZGwVUpulm

  • subdirectory

    SubDir

Targets

    • Target

      Seron_protected.exe

    • Size

      2.3MB

    • MD5

      a1e7539d32cd463c86540e00607e274b

    • SHA1

      537b182c080ddd6fa8e89b31d67297abf7aef554

    • SHA256

      828b9961731797b0a487f095d9980d3771599eb54feab35d1e856b925558e61a

    • SHA512

      33c8ff00732e04a360c57aef401467f54a649563c5820c81c19b5de1607102bd9c29c65ca4f8c914885a0031b0c415339efa01122fbda58e17d8ff632d48b567

    • SSDEEP

      49152:M55We0VQ+028J5gyUjjp5bCt7S275L6MP/J2H76gYSt98H9Y08ChNB/n:M55We0VCN6jjp5bC5Ft6MX4H76XStCdz

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Executes dropped EXE

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks