General
-
Target
XClient.rar
-
Size
53KB
-
Sample
250127-bcg9casmfs
-
MD5
e6f73d714362fabc16ba67f860fc6ada
-
SHA1
1190df500df258f434bd6c8def231e210c9f45a6
-
SHA256
22ae9f3838ce28bc03bcb7424f03e3f9a44b660d6647f035bd477bdbcc273900
-
SHA512
a0fc6adeb8c054b8ed9a13a3d64c6a6901477b384facc5183fc2c1cd39128f53f12203e983d3204a1710aaa9e20031356ec50705482b0b0477479ba136c6a92b
-
SSDEEP
768:SfiKlRdTOni46snvxCPVFgteS4QunUNo9MlReUydiEO9NKX4AYsBW9WaeA4dyNFe:KRTwhzcOtehQ9uWVyMdc4AY0/h8Sr
Static task
static1
Malware Config
Extracted
xworm
147.185.221.25:27696
-
install_file
USB.exe
Extracted
quasar
1.4.1
hawk tuah spit on that thang
127.0.0.1:4782
a97ab5d1-3593-490e-ac3c-7ce1e78e911d
-
encryption_key
6A61F72362B5449D105FC5E6F1FF9D328D267FB3
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
XClient.rar
-
Size
53KB
-
MD5
e6f73d714362fabc16ba67f860fc6ada
-
SHA1
1190df500df258f434bd6c8def231e210c9f45a6
-
SHA256
22ae9f3838ce28bc03bcb7424f03e3f9a44b660d6647f035bd477bdbcc273900
-
SHA512
a0fc6adeb8c054b8ed9a13a3d64c6a6901477b384facc5183fc2c1cd39128f53f12203e983d3204a1710aaa9e20031356ec50705482b0b0477479ba136c6a92b
-
SSDEEP
768:SfiKlRdTOni46snvxCPVFgteS4QunUNo9MlReUydiEO9NKX4AYsBW9WaeA4dyNFe:KRTwhzcOtehQ9uWVyMdc4AY0/h8Sr
-
Detect Xworm Payload
-
Quasar family
-
Quasar payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-