General
-
Target
$sxr-Uni.exe
-
Size
349KB
-
Sample
240611-vrrk4svdjp
-
MD5
1ec86aa544089409730a3777da35c70a
-
SHA1
b592008ecc06d47bd7170f0ad3799e114139df0f
-
SHA256
5d533976a3ac74eede22a42c2776ce3a392596b98c5ef0e6bed98b6395fb0c48
-
SHA512
fbd7a000b74f0488039aa9213d56cf464b55629c9c649bde2835216f699f51f921d417d090e7e2e0d6e7c10a07c4b767ada82a8ac45fcfc10c950163f2df9715
-
SSDEEP
6144:ErL3HRsM+OFZHBcFU4EljaWbrqXMxxz5A8XklSoj:6VP+MXuCJayqXMr5mlSoj
Behavioral task
behavioral1
Sample
$sxr-Uni.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
$sxr-Uni.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
quasar
3.0.0
Slave
runderscore00-63294.portmap.host:63294
QSR_MUTEX_zImH6b2ccpa3QdeboZ
-
encryption_key
Ep14qTjvhc0fuqxF9hv4
-
install_name
$sxr-powershell.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
Powershell
-
subdirectory
$sxr-seroxen2
Targets
-
-
Target
$sxr-Uni.exe
-
Size
349KB
-
MD5
1ec86aa544089409730a3777da35c70a
-
SHA1
b592008ecc06d47bd7170f0ad3799e114139df0f
-
SHA256
5d533976a3ac74eede22a42c2776ce3a392596b98c5ef0e6bed98b6395fb0c48
-
SHA512
fbd7a000b74f0488039aa9213d56cf464b55629c9c649bde2835216f699f51f921d417d090e7e2e0d6e7c10a07c4b767ada82a8ac45fcfc10c950163f2df9715
-
SSDEEP
6144:ErL3HRsM+OFZHBcFU4EljaWbrqXMxxz5A8XklSoj:6VP+MXuCJayqXMr5mlSoj
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-