General

  • Target

    payload_1.exe

  • Size

    10.3MB

  • Sample

    250204-x3asvaxrhz

  • MD5

    193c0f25237bf72feba33c0ac094633f

  • SHA1

    49d04b78ac3abed78f63f2a417aaaa3b2df015d0

  • SHA256

    f8431dd48bff13d43e84636a28c6f718f94c3fbaabfdc4505ba1c49390410dd0

  • SHA512

    f876fe18aa868e6b5fcca10e8def67f65be948283234c09cce5ab87938b1e797567498f6cc30ce7cd9bff3dd31a98a382bd950e1d49e1d782cce667516e62dd8

  • SSDEEP

    49152:AHZtA2qbxwSAKPbSZ8ncZSgiGrgXfaZAfCjCQquQplaoMc30D8zyYEF2SSmbUsr+:A54

Malware Config

Extracted

Family

quasar

Version

1.0.0.0

Botnet

v2.2.5 | SeroXen

C2

kimsoylak.ddns.net:4782

Mutex

2cc9d61f-950d-4f23-b7d5-45d9dda2f256

Attributes
  • encryption_key

    F467D794B2E1081B6AD1EAD5813AFA74F053248D

  • install_name

    .exe

  • log_directory

    $sxr-Logs

  • reconnect_delay

    1

Targets

    • Target

      payload_1.exe

    • Size

      10.3MB

    • MD5

      193c0f25237bf72feba33c0ac094633f

    • SHA1

      49d04b78ac3abed78f63f2a417aaaa3b2df015d0

    • SHA256

      f8431dd48bff13d43e84636a28c6f718f94c3fbaabfdc4505ba1c49390410dd0

    • SHA512

      f876fe18aa868e6b5fcca10e8def67f65be948283234c09cce5ab87938b1e797567498f6cc30ce7cd9bff3dd31a98a382bd950e1d49e1d782cce667516e62dd8

    • SSDEEP

      49152:AHZtA2qbxwSAKPbSZ8ncZSgiGrgXfaZAfCjCQquQplaoMc30D8zyYEF2SSmbUsr+:A54

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar family

    • Quasar payload

    • Seroxen family

    • Seroxen, Ser0xen

      Seroxen or SeroXen aka Ser0Xen is a trojan fist disovered in late 2022.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks