General
-
Target
Loli.bat
-
Size
7.2MB
-
Sample
250102-22xcnssmdn
-
MD5
d266b84f245e8de76e05e762e3b7cfca
-
SHA1
ed75a3413e35ff95bb01a4027f38e2a0e22e2cae
-
SHA256
26a49de957b5598e0c2e8d6d41d89320d3a363d9e6e4606237d2d487db6adaad
-
SHA512
b19446cba7f08521accd3d8ab05312d454933e3e87c7b33b9f9c2d3f484e54f6ff4fb989649d6f467f7b2a44c7d7571d5e06348b7872f4ad8acceaad4ae95b4f
-
SSDEEP
49152:2Ispe9WTFYTG/p+hBJhMIZHEUaS9Yvg/mAi+v16h18WqW18EfCfKNHppku4O3v9y:h
Static task
static1
Behavioral task
behavioral1
Sample
Loli.bat
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
quasar
-
encryption_key
31387DAD824ED1DBDC13F28AAF68CFB9BAC9E25E
-
reconnect_delay
3000
Targets
-
-
Target
Loli.bat
-
Size
7.2MB
-
MD5
d266b84f245e8de76e05e762e3b7cfca
-
SHA1
ed75a3413e35ff95bb01a4027f38e2a0e22e2cae
-
SHA256
26a49de957b5598e0c2e8d6d41d89320d3a363d9e6e4606237d2d487db6adaad
-
SHA512
b19446cba7f08521accd3d8ab05312d454933e3e87c7b33b9f9c2d3f484e54f6ff4fb989649d6f467f7b2a44c7d7571d5e06348b7872f4ad8acceaad4ae95b4f
-
SSDEEP
49152:2Ispe9WTFYTG/p+hBJhMIZHEUaS9Yvg/mAi+v16h18WqW18EfCfKNHppku4O3v9y:h
Score10/10-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-