General
-
Target
Uni.bat
-
Size
10.4MB
-
Sample
241128-v6hxhsvjgv
-
MD5
2c35e3c096365f1e1ad3bcc4de8574f7
-
SHA1
5e96223c4626c43a1c3306dbb76d94881ba6abbd
-
SHA256
91c8ec0b835f0470ee1a8b3c0c18b412c2883e3621e684cf273f3120252a8146
-
SHA512
ccccc2f5a9d80a8fc1c8431dda01973f8b81832e1e77a1e42579beb3521febbd51d9d11f58782ee68d381235f902853a1f6597de2e6ca4b15cda2a66896f4f7c
-
SSDEEP
49152:PqzgPmL6ky1xm3CCeGx8pb8y2qsqnnjh3WhZKEP7ciaTCfuoeKPtyT5YAv6cKoTW:a
Static task
static1
Behavioral task
behavioral1
Sample
Uni.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Uni.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.4.0
v15.4.5 | SeroXen
147.185.221.23:58175
a00acb06-91e4-48b0-99a0-b2768c5ea752
-
encryption_key
E9B24DC5A9D33874B0626389429DD789286126DC
-
install_name
.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
230
-
startup_key
$sxr-seroxen
Targets
-
-
Target
Uni.bat
-
Size
10.4MB
-
MD5
2c35e3c096365f1e1ad3bcc4de8574f7
-
SHA1
5e96223c4626c43a1c3306dbb76d94881ba6abbd
-
SHA256
91c8ec0b835f0470ee1a8b3c0c18b412c2883e3621e684cf273f3120252a8146
-
SHA512
ccccc2f5a9d80a8fc1c8431dda01973f8b81832e1e77a1e42579beb3521febbd51d9d11f58782ee68d381235f902853a1f6597de2e6ca4b15cda2a66896f4f7c
-
SSDEEP
49152:PqzgPmL6ky1xm3CCeGx8pb8y2qsqnnjh3WhZKEP7ciaTCfuoeKPtyT5YAv6cKoTW:a
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Loads dropped DLL
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
1Hidden Window
1Indicator Removal
1Clear Windows Event Logs
1Modify Registry
1