General
-
Target
Uni.bat
-
Size
10.4MB
-
Sample
241128-v3qsysvjbs
-
MD5
2c35e3c096365f1e1ad3bcc4de8574f7
-
SHA1
5e96223c4626c43a1c3306dbb76d94881ba6abbd
-
SHA256
91c8ec0b835f0470ee1a8b3c0c18b412c2883e3621e684cf273f3120252a8146
-
SHA512
ccccc2f5a9d80a8fc1c8431dda01973f8b81832e1e77a1e42579beb3521febbd51d9d11f58782ee68d381235f902853a1f6597de2e6ca4b15cda2a66896f4f7c
-
SSDEEP
49152:PqzgPmL6ky1xm3CCeGx8pb8y2qsqnnjh3WhZKEP7ciaTCfuoeKPtyT5YAv6cKoTW:a
Static task
static1
Behavioral task
behavioral1
Sample
Uni.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Uni.bat
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
quasar
1.4.0
v15.4.5 | SeroXen
147.185.221.23:58175
a00acb06-91e4-48b0-99a0-b2768c5ea752
-
encryption_key
E9B24DC5A9D33874B0626389429DD789286126DC
-
install_name
.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
230
-
startup_key
$sxr-seroxen
Targets
-
-
Target
Uni.bat
-
Size
10.4MB
-
MD5
2c35e3c096365f1e1ad3bcc4de8574f7
-
SHA1
5e96223c4626c43a1c3306dbb76d94881ba6abbd
-
SHA256
91c8ec0b835f0470ee1a8b3c0c18b412c2883e3621e684cf273f3120252a8146
-
SHA512
ccccc2f5a9d80a8fc1c8431dda01973f8b81832e1e77a1e42579beb3521febbd51d9d11f58782ee68d381235f902853a1f6597de2e6ca4b15cda2a66896f4f7c
-
SSDEEP
49152:PqzgPmL6ky1xm3CCeGx8pb8y2qsqnnjh3WhZKEP7ciaTCfuoeKPtyT5YAv6cKoTW:a
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
1Hidden Window
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1