General
-
Target
Uni.bat
-
Size
513KB
-
Sample
240516-wjmgvsgf3s
-
MD5
0a925ca16ec44e9565027638c4ff20f7
-
SHA1
d20cce3d5306e093b5229277bf185d8837870434
-
SHA256
f97f77ce58a88581f1c85dd041e9eae54355627ecb8a50879e3e2b2d3b93c928
-
SHA512
063be2320c4fabda61ea010ed4cecd8cb48805590d174efe9df5664afe7507ab83087b604ecb9999c7c1c51e13a841735e976d846ef6c693fe0c72ac94ca1d43
-
SSDEEP
12288:ZUA4TL+TtSVgrl27G3czjtDAJyemKolW59Evy:ZUA4Yx27GYGJyemKtivy
Static task
static1
Behavioral task
behavioral1
Sample
Uni.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Uni.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Uni.bat
Resource
win11-20240508-en
Behavioral task
behavioral4
Sample
Uni.bat
Resource
android-33-x64-arm64-20240514-en
Malware Config
Extracted
quasar
3.1.5
SLAVE
even-lemon.gl.at.ply.gg:33587
$Sxr-AidubAN29rBfWYM23w
-
encryption_key
iBg8YjYObpa3f3ADDras
-
install_name
$sxr-powershell.exe
-
log_directory
$SXR-LOGS
-
reconnect_delay
3000
-
startup_key
$sxr-powershell
-
subdirectory
$sxr-seroxen2
Targets
-
-
Target
Uni.bat
-
Size
513KB
-
MD5
0a925ca16ec44e9565027638c4ff20f7
-
SHA1
d20cce3d5306e093b5229277bf185d8837870434
-
SHA256
f97f77ce58a88581f1c85dd041e9eae54355627ecb8a50879e3e2b2d3b93c928
-
SHA512
063be2320c4fabda61ea010ed4cecd8cb48805590d174efe9df5664afe7507ab83087b604ecb9999c7c1c51e13a841735e976d846ef6c693fe0c72ac94ca1d43
-
SSDEEP
12288:ZUA4TL+TtSVgrl27G3czjtDAJyemKolW59Evy:ZUA4Yx27GYGJyemKtivy
-
Quasar payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-