Analysis

  • max time kernel
    133s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-07-2024 17:44

General

  • Target

    Uni.exe

  • Size

    348KB

  • MD5

    d98814e594224fa06fb9bf4fbfc6ee90

  • SHA1

    db74c6e773f5575b9b4b05ae206c21827f9bae57

  • SHA256

    85a3c4d50a0e17ddc581206e4ac1a2f1220c16d562d6e894f5068972159ddca0

  • SHA512

    3436b3f7c6dc4c7696ccc4d4efaebd9cada8f4d2ee9b711bbe523e26813919fb58a265ea3f3195c45dde3930f2995fc1951e387eab7437198ce060b97fce96ee

  • SSDEEP

    6144:UzL3HRsM+OFZcZt3bfTGksNFbp1xzpCSgJuzKkgfzT:CVP+MMsNh97gJuzKkWzT

Malware Config

Extracted

Family

quasar

Version

15.5.0

Botnet

SeroXen

C2

paris-itself.gl.at.ply.gg:49485

Mutex

QSR_MUTEX_9sjCnkSDYeXTl5L2qC

Attributes
  • encryption_key

    jKIJSX0QMuirSu2Asapm

  • install_name

    $sxr-powershell.exe

  • log_directory

    $sxr-Logs

  • reconnect_delay

    3000

  • startup_key

    Taskmgr

  • subdirectory

    $sxr-seroxen2

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Uni.exe
    "C:\Users\Admin\AppData\Local\Temp\Uni.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2304

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2304-0-0x00007FFD38830000-0x00007FFD38A0B000-memory.dmp
    Filesize

    1.9MB

  • memory/2304-1-0x0000000000250000-0x00000000002AE000-memory.dmp
    Filesize

    376KB

  • memory/2304-2-0x00000000051B0000-0x00000000056AE000-memory.dmp
    Filesize

    5.0MB

  • memory/2304-3-0x0000000004B40000-0x0000000004BD2000-memory.dmp
    Filesize

    584KB

  • memory/2304-4-0x0000000004BE0000-0x0000000004C46000-memory.dmp
    Filesize

    408KB

  • memory/2304-5-0x0000000005170000-0x0000000005182000-memory.dmp
    Filesize

    72KB

  • memory/2304-6-0x0000000005B60000-0x0000000005B9E000-memory.dmp
    Filesize

    248KB

  • memory/2304-8-0x0000000005FE0000-0x0000000005FEA000-memory.dmp
    Filesize

    40KB