General
-
Target
yfYldCd4zm.bat
-
Size
161B
-
Sample
240217-2yhp4sbe6w
-
MD5
f131134ea9f39c97d20b36c1ca169c49
-
SHA1
8842cfb3be34452ae9c16a62812d087742808312
-
SHA256
3a2f7a15c885f28af81322d48a6a607b6717a487f82eee96203e65487ff2786c
-
SHA512
0e9ac3decdfea771d8e6c3c29fc876c329aae7800c0aeb4e945dc06381536b5f77272d68bbf9c0c9637c2fd7267b7dd28336b19822be11e20dab621f58601af7
Static task
static1
Behavioral task
behavioral1
Sample
yfYldCd4zm.bat
Resource
win10v2004-20231222-en
Malware Config
Extracted
quasar
1.4.1
hello
89.149.23.59:4782
d0451a4c-3a53-4846-a269-e7bb8a5dbdab
-
encryption_key
721E9608C03075731B2EB2A814C5962CEFBBD83F
-
install_name
Hello.exe
-
log_directory
ok
-
reconnect_delay
3000
-
startup_key
Microsoft
-
subdirectory
SubDir
Targets
-
-
Target
yfYldCd4zm.bat
-
Size
161B
-
MD5
f131134ea9f39c97d20b36c1ca169c49
-
SHA1
8842cfb3be34452ae9c16a62812d087742808312
-
SHA256
3a2f7a15c885f28af81322d48a6a607b6717a487f82eee96203e65487ff2786c
-
SHA512
0e9ac3decdfea771d8e6c3c29fc876c329aae7800c0aeb4e945dc06381536b5f77272d68bbf9c0c9637c2fd7267b7dd28336b19822be11e20dab621f58601af7
Score10/10-
Quasar payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1