General
-
Target
Uni.bat
-
Size
272KB
-
Sample
240613-s8r7vsygrr
-
MD5
e68a50bde7ca4662d9f6a4b47b854e31
-
SHA1
3fd554edfe28d2989bcd13476bc1f6505e058c35
-
SHA256
110e64b6f140426700075c840eeaa023dd9447ff7d827bc919345cb572003fae
-
SHA512
e5006fe158ea0cf00d95433060fff4ea9a20f14b115c52f2c15ddb7e9408525ed8247cc6311416f7123812c4dc8d27a51b32ce4086586053f942653e4dd477ab
-
SSDEEP
6144:6kYbd/34dS3Tpy2Iq7T1qPYB4b3CtqR+w/2FuMhxeusG9QXQ7+:442DUAB4bSthacuMhVsEIx
Static task
static1
Behavioral task
behavioral1
Sample
Uni.bat
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
Uni.bat
Resource
win10v2004-20240611-en
Malware Config
Extracted
quasar
3.0.1
Nigga
runderscore00-37568.portmap.host:37568
QSR_MUTEX_Jk9UNyFvu6bseKbzj7
-
encryption_key
B2UIOEXN1qthFBcvL0Vb
-
install_name
$sxr-powershell.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
Powershell
-
subdirectory
$sxr-seroxen2
Targets
-
-
Target
Uni.bat
-
Size
272KB
-
MD5
e68a50bde7ca4662d9f6a4b47b854e31
-
SHA1
3fd554edfe28d2989bcd13476bc1f6505e058c35
-
SHA256
110e64b6f140426700075c840eeaa023dd9447ff7d827bc919345cb572003fae
-
SHA512
e5006fe158ea0cf00d95433060fff4ea9a20f14b115c52f2c15ddb7e9408525ed8247cc6311416f7123812c4dc8d27a51b32ce4086586053f942653e4dd477ab
-
SSDEEP
6144:6kYbd/34dS3Tpy2Iq7T1qPYB4b3CtqR+w/2FuMhxeusG9QXQ7+:442DUAB4bSthacuMhVsEIx
-
Quasar payload
-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-