General

  • Target

    vers2.0.0-installx64.exe

  • Size

    3.6MB

  • Sample

    250114-xwllrsymbr

  • MD5

    62af7389396c21b283d8655e7562d106

  • SHA1

    c54841ab13b60aaf222b926f787c8669564a8090

  • SHA256

    da320fb9d212b7d38eb28a54e1283bb4e9546ee5009540f46aff61083fecbed0

  • SHA512

    9967b67006ba3a4ec6c13025b84ba42a112ccce4c38040f3849b001d39d27febf746f6e46e6a2673f3769fdbc4dff94f722fe5593e06d6ee82c176619b7e75c3

  • SSDEEP

    98304:9EmUsgCgxpVbU/g6+WJdDldtYqdqbqjom6/JfS1:WVbU/gAhdtYqAgkJfS

Malware Config

Extracted

Family

xworm

C2

127.0.0.1:7000

Attributes
  • Install_directory

    %LocalAppData%

Extracted

Family

quasar

Version

1.4.1

Botnet

CHXMP

C2

8.8.8.8:4337

Mutex

d0ee0679-1d6f-403e-a05a-fa08da0e7baa

Attributes
  • encryption_key

    3D2B9436E897CB92D0C2E82EF036B6F461BCAEC4

  • install_name

    win10-updateKB087586-x64.exe

  • log_directory

    Temp

  • reconnect_delay

    3000

  • startup_key

    Windows Update

  • subdirectory

    wininst

Targets

    • Target

      vers2.0.0-installx64.exe

    • Size

      3.6MB

    • MD5

      62af7389396c21b283d8655e7562d106

    • SHA1

      c54841ab13b60aaf222b926f787c8669564a8090

    • SHA256

      da320fb9d212b7d38eb28a54e1283bb4e9546ee5009540f46aff61083fecbed0

    • SHA512

      9967b67006ba3a4ec6c13025b84ba42a112ccce4c38040f3849b001d39d27febf746f6e46e6a2673f3769fdbc4dff94f722fe5593e06d6ee82c176619b7e75c3

    • SSDEEP

      98304:9EmUsgCgxpVbU/g6+WJdDldtYqdqbqjom6/JfS1:WVbU/gAhdtYqAgkJfS

    • Detect Xworm Payload

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks