General
-
Target
Uni.bat
-
Size
10.4MB
-
Sample
241128-vwtw2atqdt
-
MD5
2cc589a27044382be0ec55f23f36fa41
-
SHA1
4edc18c1b0e3558086e86d4e5c344fc9bed8d97c
-
SHA256
d05dd87b7ce909f8f3f85607f9546bcbe1168a507955c4d504d8c83f02d9a909
-
SHA512
baf948e4257cda2a0c30e9663448e884d40d844cc0f15cb64a9a2ccc40c12d1bdf1b5808d80b19c0f401478504468669d44edcdf0153f88d1b3ceb3303656045
-
SSDEEP
49152:C/JouIj6nHI8l5lK7g/JLyDX7YVDazqMdubv+JrncVzgH+60gF4SLF+pHGwhESAG:K
Static task
static1
Behavioral task
behavioral1
Sample
Uni.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Uni.bat
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
quasar
1.4.0
v15.4.5 | SeroXen
map-casio.gl.at.ply.gg:57345
93520150-37f5-4b86-9682-b07d73e61808
-
encryption_key
E9B24DC5A9D33874B0626389429DD789286126DC
-
install_name
.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
230
-
startup_key
$sxr-seroxen
Targets
-
-
Target
Uni.bat
-
Size
10.4MB
-
MD5
2cc589a27044382be0ec55f23f36fa41
-
SHA1
4edc18c1b0e3558086e86d4e5c344fc9bed8d97c
-
SHA256
d05dd87b7ce909f8f3f85607f9546bcbe1168a507955c4d504d8c83f02d9a909
-
SHA512
baf948e4257cda2a0c30e9663448e884d40d844cc0f15cb64a9a2ccc40c12d1bdf1b5808d80b19c0f401478504468669d44edcdf0153f88d1b3ceb3303656045
-
SSDEEP
49152:C/JouIj6nHI8l5lK7g/JLyDX7YVDazqMdubv+JrncVzgH+60gF4SLF+pHGwhESAG:K
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
1Hidden Window
1