General
-
Target
Rat remove.bat
-
Size
409KB
-
Sample
240627-2ynlcswgla
-
MD5
4a9a21634ca5574ce01fa7bac0950d54
-
SHA1
c29eb629cbe62c7828f16c5ad6b29ba015eb7b69
-
SHA256
a003924092f4eed3281ccd3f82d95548a809a09436ee07b01b6d738a7c1f809d
-
SHA512
e82f2df2f40cf8d51a85c2ee4e3fe78ff739b1581688b5107cbd8bec53a1d351ef3c16fdf4e709ad7f47afa55e5bcc4ed8de224e587f4dd873e0486b08e7325e
-
SSDEEP
12288:YpiREGJFK6Fcbpdw5sI68ulIPPMQE1SQ:AwpJsb34ZPPsH
Malware Config
Extracted
quasar
3.1.5
SeroXen
147.185.221.20:47638
$Sxr-GV6wZsGZZMeZ3qfenc
-
encryption_key
hwFlXMrCGoyqiQGmMvlX
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Windows Defender Anti-Malware Disable Startup
-
subdirectory
SubDir
Targets
-
-
Target
Rat remove.bat
-
Size
409KB
-
MD5
4a9a21634ca5574ce01fa7bac0950d54
-
SHA1
c29eb629cbe62c7828f16c5ad6b29ba015eb7b69
-
SHA256
a003924092f4eed3281ccd3f82d95548a809a09436ee07b01b6d738a7c1f809d
-
SHA512
e82f2df2f40cf8d51a85c2ee4e3fe78ff739b1581688b5107cbd8bec53a1d351ef3c16fdf4e709ad7f47afa55e5bcc4ed8de224e587f4dd873e0486b08e7325e
-
SSDEEP
12288:YpiREGJFK6Fcbpdw5sI68ulIPPMQE1SQ:AwpJsb34ZPPsH
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-