General
-
Target
mrBm8Y3.bat
-
Size
586KB
-
Sample
240612-vz4kmsxapm
-
MD5
3f2ff12924a2e6b1f1f620730af14a1f
-
SHA1
9b96ce86949bfa7a6b4fbcfcca244351363c2d2c
-
SHA256
e3b9b4050f8c00bc5ab2cb09859ecfc623e1f82ed9dde434da04231f61f0cc2d
-
SHA512
4e068b5f06cd7b7c7f9abe66f3df1b439b486d93e6c9bed909390ae2e1c9009a0efcece1563fb92d548c8c63fcc675657adcf83e01e21c8903e2895790d7c8b0
-
SSDEEP
12288:h2kXaWZMrh7XcHgycdfYK1juRasp5AZBAU+2LIl:h2kKWS+gy8eqP0l
Static task
static1
Behavioral task
behavioral1
Sample
mrBm8Y3.bat
Resource
win7-20240611-en
Malware Config
Extracted
quasar
3.0.0
Slave
runderscore00-37568.portmap.host:37568
QSR_MUTEX_iprdkSELqVacGNZeWS
-
encryption_key
tiqC8HadqR4q5ImAfm0o
-
install_name
$sxr-powershell.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
Powershell
-
subdirectory
$sxr-seroxen2
Targets
-
-
Target
mrBm8Y3.bat
-
Size
586KB
-
MD5
3f2ff12924a2e6b1f1f620730af14a1f
-
SHA1
9b96ce86949bfa7a6b4fbcfcca244351363c2d2c
-
SHA256
e3b9b4050f8c00bc5ab2cb09859ecfc623e1f82ed9dde434da04231f61f0cc2d
-
SHA512
4e068b5f06cd7b7c7f9abe66f3df1b439b486d93e6c9bed909390ae2e1c9009a0efcece1563fb92d548c8c63fcc675657adcf83e01e21c8903e2895790d7c8b0
-
SSDEEP
12288:h2kXaWZMrh7XcHgycdfYK1juRasp5AZBAU+2LIl:h2kKWS+gy8eqP0l
-
Quasar payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-