General
-
Target
Loader.bat
-
Size
586KB
-
Sample
240607-we464sbe9y
-
MD5
30efee247e7c04f823c46e89192ea291
-
SHA1
bdd750191bd9a8ebea65512d73fde8849be28a2a
-
SHA256
13079ae40df645092364c579428e27f18e76060be24300284458daaee56210d1
-
SHA512
87e83b62f4504ca64d5219736b5094f40396f2bcaa365f9ee2b78a83a8081fa634199ff3dcd3c35b43c2974fa1e1b5e48893031f47e4d2063224be9c5b9d55a4
-
SSDEEP
12288:wXkI0ImO8CwY9uL83MxAU65F5o5KgNVWoUYbR:wXkI0ImO8CwO6FAVYHf
Static task
static1
Malware Config
Extracted
quasar
1.3.0.0
Zer0Spy
runderscore00-61208.portmap.host:61208
QSR_MUTEX_9vwtyaiSuBr8jzh6yA
-
encryption_key
MGPKlHKpBvRDnGpfn0IX
-
install_name
$phantom-powershell.exe
-
log_directory
$phantom-Logs
-
reconnect_delay
3000
-
startup_key
Windows PowerShell
-
subdirectory
$phantom-zer0spy2
Targets
-
-
Target
Loader.bat
-
Size
586KB
-
MD5
30efee247e7c04f823c46e89192ea291
-
SHA1
bdd750191bd9a8ebea65512d73fde8849be28a2a
-
SHA256
13079ae40df645092364c579428e27f18e76060be24300284458daaee56210d1
-
SHA512
87e83b62f4504ca64d5219736b5094f40396f2bcaa365f9ee2b78a83a8081fa634199ff3dcd3c35b43c2974fa1e1b5e48893031f47e4d2063224be9c5b9d55a4
-
SSDEEP
12288:wXkI0ImO8CwY9uL83MxAU65F5o5KgNVWoUYbR:wXkI0ImO8CwO6FAVYHf
-
Quasar payload
-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-