General

  • Target

    https://156.253.250.62/uploads/

  • Sample

    250131-cqabbszkan

Malware Config

Extracted

Family

quasar

Attributes
  • reconnect_delay

    3000

Extracted

Family

xworm

Version

5.0

C2

185.241.208.111:7050

Mutex

HiisPb8WWhndkdzw

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot7925063320:AAH7uvADOuyr-QvUdoVePbQI9F3yoSZZ45A

aes.plain

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7925063320:AAH7uvADOuyr-QvUdoVePbQI9F3yoSZZ45A/sendMessage?chat_id=-4773407783

Targets

    • Target

      https://156.253.250.62/uploads/

    • Detect Xworm Payload

    • Gurcu family

    • Gurcu, WhiteSnake

      Gurcu aka WhiteSnake is a malware stealer written in C#.

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks