General
-
Target
Uni.bat
-
Size
272KB
-
Sample
240612-wfhdqstfjh
-
MD5
329572afb540453454c308ad833fb18d
-
SHA1
40a3918710ce684e3f1ee3b8185bb2711c24d0c5
-
SHA256
8c11bf6c6613e02ba059ce545de03e575c022e13d4ec6fa4a61212c22d6d36a6
-
SHA512
88a33ef1e925179518bbfc99ffb4a526a95d533430aeaeee5f87036a7162d2108e4685966be53df922241ebbee24f3b0a61381a47b0f9f146f43ffa00d9350ac
-
SSDEEP
6144:wHEnX3bfXFDNDPZ+oo3NF9POEOVMr4jqK:w6DBNF+p3PCnuK
Static task
static1
Behavioral task
behavioral1
Sample
Uni.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Uni.bat
Resource
win10v2004-20240611-en
Malware Config
Extracted
quasar
3.0.1
Slave
runderscore00-37568.portmap.host:37568
QSR_MUTEX_1ujjwOVNfEnJdJ6fzt
-
encryption_key
BaV1r1Ry830cRsn0PkJ3
-
install_name
$sxr-powershell.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
Powershell
-
subdirectory
$sxr-seroxen2
Targets
-
-
Target
Uni.bat
-
Size
272KB
-
MD5
329572afb540453454c308ad833fb18d
-
SHA1
40a3918710ce684e3f1ee3b8185bb2711c24d0c5
-
SHA256
8c11bf6c6613e02ba059ce545de03e575c022e13d4ec6fa4a61212c22d6d36a6
-
SHA512
88a33ef1e925179518bbfc99ffb4a526a95d533430aeaeee5f87036a7162d2108e4685966be53df922241ebbee24f3b0a61381a47b0f9f146f43ffa00d9350ac
-
SSDEEP
6144:wHEnX3bfXFDNDPZ+oo3NF9POEOVMr4jqK:w6DBNF+p3PCnuK
-
Quasar payload
-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-