General
-
Target
VerifiedAssetLinked.exe
-
Size
3.2MB
-
Sample
250326-wa9k2azvdw
-
MD5
e8ecf83250f2badd7aa0c240fdc7be04
-
SHA1
23081fbff25cb90abfaa3f6c80d3ae79dbaf6fdb
-
SHA256
adb07f246886c9b3923cb565463a66cc3e69f16982dd513669d09b5285ac5cfa
-
SHA512
aeebeb2f787303a8ea5594fd94e7c8002b8dd9eb6dd01bea001a6540c96954359d8fc2e4a596108256d197ef06bebca367900e388882e17ab134c2e8ec595140
-
SSDEEP
49152:uXMWUmXsmnc6gB5LCeVYc5qwKQaUW6KfR3kVmqEze6ylTfKb8ExP0abZAGU3uXfp:kzTc6gBFi6aL7i1serlrK10EpU3uW
Static task
static1
Behavioral task
behavioral1
Sample
VerifiedAssetLinked.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
84.67.89.127:4782
40b84850-9991-4b2c-a985-76db9b77d6fe
-
encryption_key
24D2D4587F63E088D81748782350D3C2EF08E8BC
-
install_name
SystemRuntimes.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
DisplayRuntimes
-
subdirectory
SubDir
Extracted
xworm
5.0
84.67.89.127:7000
i0Qt3kYCfooW9ohR
-
Install_directory
%AppData%
-
install_file
System.exe
Targets
-
-
Target
VerifiedAssetLinked.exe
-
Size
3.2MB
-
MD5
e8ecf83250f2badd7aa0c240fdc7be04
-
SHA1
23081fbff25cb90abfaa3f6c80d3ae79dbaf6fdb
-
SHA256
adb07f246886c9b3923cb565463a66cc3e69f16982dd513669d09b5285ac5cfa
-
SHA512
aeebeb2f787303a8ea5594fd94e7c8002b8dd9eb6dd01bea001a6540c96954359d8fc2e4a596108256d197ef06bebca367900e388882e17ab134c2e8ec595140
-
SSDEEP
49152:uXMWUmXsmnc6gB5LCeVYc5qwKQaUW6KfR3kVmqEze6ylTfKb8ExP0abZAGU3uXfp:kzTc6gBFi6aL7i1serlrK10EpU3uW
-
Detect Xworm Payload
-
Quasar family
-
Quasar payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-