General
-
Target
Test.bat
-
Size
186B
-
Sample
240530-p67b8ahd4z
-
MD5
9c4d95c3db51f66fed113f3f97c634ed
-
SHA1
4aa3b2737d2883c3546ba198dbfe01354ed280b3
-
SHA256
624dddefe23183f69741089a3a0a54a6d5fe8b95d12479dba2a5972880c7013a
-
SHA512
ed3e20e2123239d57b8e9da07c576cd9255ab386ba33025077ce7eb125a1a018375381c1886a1312d478930b4844149ece2f8f21f0972c200f154b5b5790cf9b
Static task
static1
Behavioral task
behavioral1
Sample
Test.bat
Resource
win7-20240508-en
Malware Config
Extracted
quasar
1.4.1
Astro-1
arthurus36.duckdns.org:5555
ad7cd985-5e2e-45a3-9246-b82449c7c4d8
-
encryption_key
6314C8C60AA1035CEB920FD38F0342E398BAF5D0
-
install_name
cmdprmpt.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
systemdex
Targets
-
-
Target
Test.bat
-
Size
186B
-
MD5
9c4d95c3db51f66fed113f3f97c634ed
-
SHA1
4aa3b2737d2883c3546ba198dbfe01354ed280b3
-
SHA256
624dddefe23183f69741089a3a0a54a6d5fe8b95d12479dba2a5972880c7013a
-
SHA512
ed3e20e2123239d57b8e9da07c576cd9255ab386ba33025077ce7eb125a1a018375381c1886a1312d478930b4844149ece2f8f21f0972c200f154b5b5790cf9b
-
Quasar payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-