General
-
Target
hand.bat
-
Size
7.0MB
-
Sample
241119-z9bptsxqfp
-
MD5
1a013c7ac90b58073895b26cae70def7
-
SHA1
60c9c3294fc7ac3d336a478274f62f4818498230
-
SHA256
698b1f0a35a76e57adef388612b29902f86f56983c772d7c6c17b4483c2be688
-
SHA512
c1bbb52e8546b352e041e944d7dfa158d5dc9a51b1628128d345e4a9e708871d7a1f5e59cc44a2c66f8dc9af81ec06e1b5105d5a7292497075564496f3b0ec75
-
SSDEEP
49152:vZrlGoT+Xts/LJjeDPnIwT0ZFBZP2x3fLKs0HMb0DprNMiKwPjp9Kw2EdF8d7nrx:Y
Static task
static1
Behavioral task
behavioral1
Sample
hand.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
hand.bat
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
hand.bat
Resource
win11-20241007-en
Malware Config
Extracted
quasar
-
encryption_key
1162A0E173FED8E7CF598896A547E279E681EE6F
-
reconnect_delay
3000
Targets
-
-
Target
hand.bat
-
Size
7.0MB
-
MD5
1a013c7ac90b58073895b26cae70def7
-
SHA1
60c9c3294fc7ac3d336a478274f62f4818498230
-
SHA256
698b1f0a35a76e57adef388612b29902f86f56983c772d7c6c17b4483c2be688
-
SHA512
c1bbb52e8546b352e041e944d7dfa158d5dc9a51b1628128d345e4a9e708871d7a1f5e59cc44a2c66f8dc9af81ec06e1b5105d5a7292497075564496f3b0ec75
-
SSDEEP
49152:vZrlGoT+Xts/LJjeDPnIwT0ZFBZP2x3fLKs0HMb0DprNMiKwPjp9Kw2EdF8d7nrx:Y
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-