General
-
Target
Uni.bat
-
Size
12.9MB
-
Sample
230603-nn9h7aha2z
-
MD5
3544b71987db84694b674062d7d74a29
-
SHA1
67a1041c5de311e2e3557c2af88da8c06e93a51c
-
SHA256
bbeb752aacc339f7ef158033bbec70ddec45a2d78844a9f9420472c8f53c88a0
-
SHA512
d15d8658978ff22cc02065ecbb77ec5c03fdd7246d7c4456a97e1c5ff59f285308b4d603f4be1419b0e3b95209008ff3fab80132df5c4b599e2aa09262d12184
-
SSDEEP
49152:Cp8wlEGTlT4OZmnakkNluieppjv/Vv73Ie5jLpaj3hy60tOkuC82waNWwzw0nNlO:8
Static task
static1
Malware Config
Extracted
quasar
1.0.0.0
v15.5.4 | converted
program-gifts.at.ply.gg:59438
e393f62b-3677-4587-82a4-b223e8ac894d
-
encryption_key
7A32A8298A4A90B4D67B1C6B833599E13C052135
-
install_name
.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
$sxr-seroxen
Targets
-
-
Target
Uni.bat
-
Size
12.9MB
-
MD5
3544b71987db84694b674062d7d74a29
-
SHA1
67a1041c5de311e2e3557c2af88da8c06e93a51c
-
SHA256
bbeb752aacc339f7ef158033bbec70ddec45a2d78844a9f9420472c8f53c88a0
-
SHA512
d15d8658978ff22cc02065ecbb77ec5c03fdd7246d7c4456a97e1c5ff59f285308b4d603f4be1419b0e3b95209008ff3fab80132df5c4b599e2aa09262d12184
-
SSDEEP
49152:Cp8wlEGTlT4OZmnakkNluieppjv/Vv73Ie5jLpaj3hy60tOkuC82waNWwzw0nNlO:8
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-