Analysis
-
max time kernel
78s -
max time network
133s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
13-06-2024 15:51
Behavioral task
behavioral1
Sample
Uni.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Uni.exe
Resource
win10v2004-20240611-en
General
-
Target
Uni.exe
-
Size
348KB
-
MD5
eadc6298cf80a65da86c5f095d80365b
-
SHA1
4f15223e11f8305096832673e7d3330551dde643
-
SHA256
1f46634fd66862bbe110740bd12d9989421ba0e22ab97cebf220b481b191ca2f
-
SHA512
1b2835f018524c98ba66dfcf02b191f11131d9b7907961d13ddbdf22fac8c8fe6168fbc0bf98c4ac3d8067ab6c2d7ab9eab64cc82c0662d183847456624f17d3
-
SSDEEP
6144:bzL3HRsM+OFZsDfyaALjuWndicpbPf9ZOK8niVbkmJu:XVP+MPFnBpf9ZORniVbkmJu
Malware Config
Extracted
quasar
3.0.1
Nigga
runderscore00-37568.portmap.host:37568
QSR_MUTEX_Jk9UNyFvu6bseKbzj7
-
encryption_key
1hhxPzuu9tRn0FXFEBW4
-
install_name
$sxr-powershell.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
Powershell
-
subdirectory
$sxr-seroxen2
Signatures
-
Quasar payload 1 IoCs
resource yara_rule behavioral1/memory/1296-1-0x00000000003A0000-0x00000000003FE000-memory.dmp family_quasar -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1296 Uni.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1296 Uni.exe