General
-
Target
noloud.bat
-
Size
12KB
-
Sample
241124-w8yw7ayqhl
-
MD5
e435591eabd5596e754a7acaede7dca7
-
SHA1
2b1b728aae5d3e72fe4bc864559d0347489f995a
-
SHA256
a599fcae8f2c31fb4bf0fe02b30e4ee4bd23d599c6c3d9a571df508a470d690d
-
SHA512
3248a7cf8542068c126906b9db5e3fb0dde7ca123b7cf3f5375aad6b5c65bb909db5e3b5e127104e664b57eea4774d5283228533f01beb45b50ccdd3545e8f69
-
SSDEEP
384:gTYcpQyuPmhDGEhtKCR2XYmE2JdAp6EbW263JM3jXMIccK:gTYcpQyuPmhDGEhtKCReU2JdjES3JQj4
Static task
static1
Behavioral task
behavioral1
Sample
noloud.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
noloud.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.4.1
UnderControl
google-15-node.giize.com:9876
192.168.0.192:9876
127.0.0.1:9876
SeraiBawang-61025.portmap.io::61025
BlackMaster: UnderControl
-
encryption_key
070CDBCBB8132B62B93E1CB06630D9221F0FFA4A
-
install_name
MicrosoftAI.exe
-
log_directory
USSR
-
reconnect_delay
2000
-
startup_key
Microsoft Private Ai
-
subdirectory
Microsoft
Targets
-
-
Target
noloud.bat
-
Size
12KB
-
MD5
e435591eabd5596e754a7acaede7dca7
-
SHA1
2b1b728aae5d3e72fe4bc864559d0347489f995a
-
SHA256
a599fcae8f2c31fb4bf0fe02b30e4ee4bd23d599c6c3d9a571df508a470d690d
-
SHA512
3248a7cf8542068c126906b9db5e3fb0dde7ca123b7cf3f5375aad6b5c65bb909db5e3b5e127104e664b57eea4774d5283228533f01beb45b50ccdd3545e8f69
-
SSDEEP
384:gTYcpQyuPmhDGEhtKCR2XYmE2JdAp6EbW263JM3jXMIccK:gTYcpQyuPmhDGEhtKCReU2JdjES3JQj4
-
Quasar family
-
Quasar payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3