General
-
Target
Space Paid v2.bat
-
Size
586KB
-
Sample
240611-y6bpzszgpg
-
MD5
a5c3bef843c9d6022db92547f32855d1
-
SHA1
816338da7ee45d496f39bbd36c6b106ee0b3e2fe
-
SHA256
ef70e618b652c777b3b2e589d1381bda6c7e49e7f2510334257c1e2add139045
-
SHA512
0e44e31275a89f29388418538f57cb3437ad1d24f08d0c3c7d85a1a906c5b212024f2960237b66e3f2838923497e82f198ad8c4ed0b34548190e6db03504f1bd
-
SSDEEP
12288:aAjiyOzsNdeAKQ1pCTt/dMpEncClHel1wF2sEyutyF7Pd8CM:aA+yOYHlKopC/62caqT+d8R
Static task
static1
Behavioral task
behavioral1
Sample
Space Paid v2.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Space Paid v2.bat
Resource
win10v2004-20240611-en
Malware Config
Extracted
quasar
3.0.0
Slave
runderscore00-63294.portmap.host:63294
QSR_MUTEX_KJSikjqkjc5AYGioTK
-
encryption_key
bU53s6xktYcC9aQVfouV
-
install_name
$sxr-powershell.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
Powershell
-
subdirectory
$sxr-seroxen2
Targets
-
-
Target
Space Paid v2.bat
-
Size
586KB
-
MD5
a5c3bef843c9d6022db92547f32855d1
-
SHA1
816338da7ee45d496f39bbd36c6b106ee0b3e2fe
-
SHA256
ef70e618b652c777b3b2e589d1381bda6c7e49e7f2510334257c1e2add139045
-
SHA512
0e44e31275a89f29388418538f57cb3437ad1d24f08d0c3c7d85a1a906c5b212024f2960237b66e3f2838923497e82f198ad8c4ed0b34548190e6db03504f1bd
-
SSDEEP
12288:aAjiyOzsNdeAKQ1pCTt/dMpEncClHel1wF2sEyutyF7Pd8CM:aA+yOYHlKopC/62caqT+d8R
-
Quasar payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-