General
-
Target
tKs7nbI.bat
-
Size
1003KB
-
Sample
240530-vbqzmsec51
-
MD5
a9c91096bbb037810b2cc22d81e8d95d
-
SHA1
ea3929bc88ca4c0c943b3f0522cacfbbb9de6b4d
-
SHA256
cc31f9abb4a23b7d94d6f17b23351d1ee4302fa779b627aa35c24dbf17ec7a5c
-
SHA512
ed4cba44fed44fbcc381e01d83d42e0ed667bd0922170db56a52a041e3557380b48e84b161cc389cdf69c8dd86c873b31828798acfc738e6ce8a89fa86b2ca64
-
SSDEEP
24576:Xh3RydALrdPnUJBuvYf0xlLpv33P5ShWAceU7:pgdALFnduOvHPIw7
Static task
static1
Behavioral task
behavioral1
Sample
tKs7nbI.bat
Resource
win10v2004-20240426-en
Malware Config
Extracted
quasar
-
reconnect_delay
3000
Extracted
quasar
3.1.5
v3.1.5 | SeroXen
runderscore00-25501.portmap.host:25501
$Sxr-jy6vh8CtEJL5ceZuIb
-
encryption_key
RqhtG6daCh0jt3avVuLQ
-
install_name
$77-powershell.exe
-
log_directory
$77-Logs
-
reconnect_delay
3000
-
startup_key
$77-Powershell
-
subdirectory
$77-SeroXen
Targets
-
-
Target
tKs7nbI.bat
-
Size
1003KB
-
MD5
a9c91096bbb037810b2cc22d81e8d95d
-
SHA1
ea3929bc88ca4c0c943b3f0522cacfbbb9de6b4d
-
SHA256
cc31f9abb4a23b7d94d6f17b23351d1ee4302fa779b627aa35c24dbf17ec7a5c
-
SHA512
ed4cba44fed44fbcc381e01d83d42e0ed667bd0922170db56a52a041e3557380b48e84b161cc389cdf69c8dd86c873b31828798acfc738e6ce8a89fa86b2ca64
-
SSDEEP
24576:Xh3RydALrdPnUJBuvYf0xlLpv33P5ShWAceU7:pgdALFnduOvHPIw7
Score10/10-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-