General
-
Target
syntaxloader.bat
-
Size
25KB
-
Sample
241108-1h5n9szgle
-
MD5
ea50d652e81767c52b0f8428ff1e25da
-
SHA1
430b12c8f82e58ec10a00426f506b9a0bd71489a
-
SHA256
146ef38c311af5e1375df0f2ad2f34f691b1104c35e20a610a68eb8147db7e0b
-
SHA512
60072e939c4b0b3296f699cfb9585444231fad591323c61d4fb9c41828ab41e4afb171cf036623a697ed73e9a0db68954c2f92bac032180b68ca8842390e909f
-
SSDEEP
384:7f07tvjFJnoSCZV5mbksKIyaxoxJy1KTb:j07tHoSCZqbhKIyPmKf
Static task
static1
Behavioral task
behavioral1
Sample
syntaxloader.bat
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Office04
45.95.214.119:1604
3e9a7b17-c168-4406-a87b-cdcabb53c1e4
-
encryption_key
B45F6102F44CEBC69B790BA64CFCD6C9F8E03CE3
-
install_name
battleeye.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Update
-
subdirectory
beservice
Targets
-
-
Target
syntaxloader.bat
-
Size
25KB
-
MD5
ea50d652e81767c52b0f8428ff1e25da
-
SHA1
430b12c8f82e58ec10a00426f506b9a0bd71489a
-
SHA256
146ef38c311af5e1375df0f2ad2f34f691b1104c35e20a610a68eb8147db7e0b
-
SHA512
60072e939c4b0b3296f699cfb9585444231fad591323c61d4fb9c41828ab41e4afb171cf036623a697ed73e9a0db68954c2f92bac032180b68ca8842390e909f
-
SSDEEP
384:7f07tvjFJnoSCZV5mbksKIyaxoxJy1KTb:j07tHoSCZqbhKIyPmKf
-
Quasar family
-
Quasar payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops file in System32 directory
-