General
-
Target
WiKxtRl.bat
-
Size
272KB
-
Sample
240614-tkqvkaxflb
-
MD5
f8c89040f07e6c7a606aff9fb0290cce
-
SHA1
4fb4fa46db09a97e86211e957c57f79329f337db
-
SHA256
2f878f17890e54a4592aa7b9cd78f5b8d44e0254cf85744d94590200bed8d125
-
SHA512
aebb8f52e159859a949ab73c6732bb33dc97fe78b91f88a615dd369e53c717a10a1e1270bb82f25d3676b707a0d257003dc8e1b78693483d23cc9d2f25b64cd1
-
SSDEEP
6144:uI+T8bqc6S8uX/PjYPH8LJWGwe1EhBdm0x3UfRbx:uzT2v78Sy849e1sL2RF
Static task
static1
Behavioral task
behavioral1
Sample
WiKxtRl.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
WiKxtRl.bat
Resource
win10v2004-20240508-en
Malware Config
Extracted
quasar
3.0.1
Home
runderscore00-37568.portmap.host:37568
QSR_MUTEX_7eiwpVBqV4jgLShS0s
-
encryption_key
cxiUIqKRDWrc2NXNxx7H
-
install_name
$sxr-powershell.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
Powershell
-
subdirectory
$sxr-seroxen2
Targets
-
-
Target
WiKxtRl.bat
-
Size
272KB
-
MD5
f8c89040f07e6c7a606aff9fb0290cce
-
SHA1
4fb4fa46db09a97e86211e957c57f79329f337db
-
SHA256
2f878f17890e54a4592aa7b9cd78f5b8d44e0254cf85744d94590200bed8d125
-
SHA512
aebb8f52e159859a949ab73c6732bb33dc97fe78b91f88a615dd369e53c717a10a1e1270bb82f25d3676b707a0d257003dc8e1b78693483d23cc9d2f25b64cd1
-
SSDEEP
6144:uI+T8bqc6S8uX/PjYPH8LJWGwe1EhBdm0x3UfRbx:uzT2v78Sy849e1sL2RF
-
Quasar payload
-
Blocklisted process makes network request
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-