General
-
Target
5vFnUTA.bat
-
Size
33.8MB
-
Sample
240609-v1trtsch5y
-
MD5
7360d5c5787795efddb21ead0a7b087a
-
SHA1
261a0079e595fbf4203d4314d29e233d8a0ef9fc
-
SHA256
f1ebb419ee0133174b64a7668c750f87367970971daaffdf1f85328c4875d9e6
-
SHA512
9be6997a3fae5bc97c997c46bae8985606527e91430fb4c145119fdfd97d8daa83523e9fa2cd40ce3486c231dcedbd4a4159c2f645b1746998ab2419aa262d14
-
SSDEEP
12288:PiR+aj62WqH39ttfD1KhLZ6azySThfOwppoCQ/gcOhKrYFuuZUDGO0:aQt2WwxGJtvpOt/owriUDt0
Static task
static1
Malware Config
Extracted
quasar
1.3.0.0
Slave
runderscore00-61208.portmap.host:61208
QSR_MUTEX_cq1PvE2FSZsrtLytho
-
encryption_key
5vXgZSbIpHJzAn3ZrosQ
-
install_name
$phantom-powershell.exe
-
log_directory
$phantom-Logs
-
reconnect_delay
3000
-
startup_key
Powershell
-
subdirectory
$phantom-zero
Targets
-
-
Target
5vFnUTA.bat
-
Size
33.8MB
-
MD5
7360d5c5787795efddb21ead0a7b087a
-
SHA1
261a0079e595fbf4203d4314d29e233d8a0ef9fc
-
SHA256
f1ebb419ee0133174b64a7668c750f87367970971daaffdf1f85328c4875d9e6
-
SHA512
9be6997a3fae5bc97c997c46bae8985606527e91430fb4c145119fdfd97d8daa83523e9fa2cd40ce3486c231dcedbd4a4159c2f645b1746998ab2419aa262d14
-
SSDEEP
12288:PiR+aj62WqH39ttfD1KhLZ6azySThfOwppoCQ/gcOhKrYFuuZUDGO0:aQt2WwxGJtvpOt/owriUDt0
-
Quasar payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-