General

  • Target

    Sorillas.jar

  • Size

    10.0MB

  • Sample

    250204-n9xfraxleq

  • MD5

    7e3c3eadd00b0903f1fcc806536cf406

  • SHA1

    efe17275ac9ffc91fb1ce25f579fbfa1f8dc6095

  • SHA256

    6dfff4c60b32f6e841b1e7cf4ea99831820f4aa2dd81421d7257bdfedcd28365

  • SHA512

    9dcd295c96f6beab8fb5af447fa759bbf7ff1154f345affeff1b06e2f205e561cd6eb31db23f3656e751d0892c4b766112684068b43bb4e70a075c1a909a2abc

  • SSDEEP

    196608:ulloD+JyfJIFFM0rT/mpDni/Mcd8qAbPeGmeIWvhAn9QrmE:uHoz0FM02JiEQ/kGdeIWJC9Qrx

Malware Config

Targets

    • Target

      Sorillas.jar

    • Size

      10.0MB

    • MD5

      7e3c3eadd00b0903f1fcc806536cf406

    • SHA1

      efe17275ac9ffc91fb1ce25f579fbfa1f8dc6095

    • SHA256

      6dfff4c60b32f6e841b1e7cf4ea99831820f4aa2dd81421d7257bdfedcd28365

    • SHA512

      9dcd295c96f6beab8fb5af447fa759bbf7ff1154f345affeff1b06e2f205e561cd6eb31db23f3656e751d0892c4b766112684068b43bb4e70a075c1a909a2abc

    • SSDEEP

      196608:ulloD+JyfJIFFM0rT/mpDni/Mcd8qAbPeGmeIWvhAn9QrmE:uHoz0FM02JiEQ/kGdeIWJC9Qrx

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks