General
-
Target
CritScriptInstaller.bat
-
Size
6KB
-
Sample
241123-v6lneavpbm
-
MD5
a3ea9257f9f074a20df56d8978be9e77
-
SHA1
68d029092c7a591aac215e25269329c3c3859436
-
SHA256
32d2658a968790aa0039cf23fd097da860b938fb07d8d0b2f6779a71f40817b1
-
SHA512
a61143e0680eb03fbf625da8a58aa338e88f0e12c65a3c07b2c10eead02e7a753d64e3d4271c34b04941ef772d3e772f28b53355b1a46ce4fc6aafff164c3b46
-
SSDEEP
192:k+6tCGPbseHYtPpUaYIKopCA8KyiXn2rCxHF:kviPpUaYIKor2i
Static task
static1
Malware Config
Extracted
quasar
1.4.1
DDNS
193.161.193.99:32471
807f3187-d087-4fff-beff-e73293a32af8
-
encryption_key
81A0C14D4C705B3C678E573C849DE7F6A3671A8B
-
install_name
jusched.exe
-
log_directory
CachedLogs
-
reconnect_delay
3000
-
startup_key
Java Update Scheduler
-
subdirectory
Java
Targets
-
-
Target
CritScriptInstaller.bat
-
Size
6KB
-
MD5
a3ea9257f9f074a20df56d8978be9e77
-
SHA1
68d029092c7a591aac215e25269329c3c3859436
-
SHA256
32d2658a968790aa0039cf23fd097da860b938fb07d8d0b2f6779a71f40817b1
-
SHA512
a61143e0680eb03fbf625da8a58aa338e88f0e12c65a3c07b2c10eead02e7a753d64e3d4271c34b04941ef772d3e772f28b53355b1a46ce4fc6aafff164c3b46
-
SSDEEP
192:k+6tCGPbseHYtPpUaYIKopCA8KyiXn2rCxHF:kviPpUaYIKor2i
-
Quasar family
-
Quasar payload
-
Blocklisted process makes network request
-
Deletes itself
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1