General

  • Target

    https://mega.nz/folder/xnMzFRCA#dIVGf0RVmtFmXNwiM5kPcw

  • Sample

    250126-qhjrpatlcl

Malware Config

Extracted

Family

xworm

C2

193.31.28.181:7000

Attributes
  • Install_directory

    %AppData%

  • install_file

    RunTimeBroker.exe

Extracted

Family

quasar

Version

1.0.1

Botnet

Liminal

C2

193.31.28.181:4782

Mutex

b218401a-4db2-4567-adb2-e6027914b273

Attributes
  • encryption_key

    EF87D4BEA027C771BB62A5CF66FDFCF7F52A8A8C

  • install_name

    cmd.exe

  • log_directory

    Logs

  • reconnect_delay

    1000

  • startup_key

    cmd

Targets

    • Target

      https://mega.nz/folder/xnMzFRCA#dIVGf0RVmtFmXNwiM5kPcw

    • Detect Xworm Payload

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks