General

  • Target

    downloader.exe

  • Size

    30.1MB

  • Sample

    250107-fk92jsxlgj

  • MD5

    8899d3d18991b5e27efe1decbac510be

  • SHA1

    c7cce46e9bda1a1d3493188979179fbf3bcc7d02

  • SHA256

    e47acb3d30adf4cb18e55c30443ab216a5d4315cdc02794746e4b6977ec624c3

  • SHA512

    b504dab38978feeb4622588a9e890c29d790110bda323c861a5a4326a46180b23abd589104b3d501805a57499d9705627cdb6f835d869ed91fca2007831ec260

  • SSDEEP

    393216:R8oimu7izBxR3QRzhzvQ99Sq8lu0q5tDJKoWSxJGBL7aSmo+AJCcLKA5:R9w9wD5xUeSbJCcB

Malware Config

Extracted

Family

xworm

Version

3.1

C2

83.38.24.1:1603

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    USB.exe

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

127.0.0.1:4782

Mutex

5d77ad29-ecbd-4889-b064-98ac5cd07b21

Attributes
  • encryption_key

    14A7D36CBBFB811517C2A6A1D4EE850D361BB150

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      downloader.exe

    • Size

      30.1MB

    • MD5

      8899d3d18991b5e27efe1decbac510be

    • SHA1

      c7cce46e9bda1a1d3493188979179fbf3bcc7d02

    • SHA256

      e47acb3d30adf4cb18e55c30443ab216a5d4315cdc02794746e4b6977ec624c3

    • SHA512

      b504dab38978feeb4622588a9e890c29d790110bda323c861a5a4326a46180b23abd589104b3d501805a57499d9705627cdb6f835d869ed91fca2007831ec260

    • SSDEEP

      393216:R8oimu7izBxR3QRzhzvQ99Sq8lu0q5tDJKoWSxJGBL7aSmo+AJCcLKA5:R9w9wD5xUeSbJCcB

    • Detect Xworm Payload

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks