General
-
Target
Zeno-Loader.bat
-
Size
7.2MB
-
Sample
250105-1ecjbaynem
-
MD5
72d00f0024897e8f1df20016101ab45a
-
SHA1
af3ed84e2ed1de471e4773fb6d06aa0fc1ee0f6c
-
SHA256
67dfd63675918029facddae2fffc7573597922fbaa18c39d59a22b226d37f881
-
SHA512
6fe39ed252674f0ff775786aeab76d2decfa289f88cea0422f58d29a5d8a4890906ddef72038b1f652a108c3d3c40ac9dedcf2b4696ba89b10063f41409ba13c
-
SSDEEP
49152:gMILTqFg07h0GJm30wMjiN7lAMOLSp3q2iK2JxEaaqNaUhAFCuMtZiXC8s2FDFkg:G
Static task
static1
Malware Config
Extracted
quasar
-
encryption_key
BF83117B79367DC6A2463E499652930B1A20BE7A
-
reconnect_delay
3000
Targets
-
-
Target
Zeno-Loader.bat
-
Size
7.2MB
-
MD5
72d00f0024897e8f1df20016101ab45a
-
SHA1
af3ed84e2ed1de471e4773fb6d06aa0fc1ee0f6c
-
SHA256
67dfd63675918029facddae2fffc7573597922fbaa18c39d59a22b226d37f881
-
SHA512
6fe39ed252674f0ff775786aeab76d2decfa289f88cea0422f58d29a5d8a4890906ddef72038b1f652a108c3d3c40ac9dedcf2b4696ba89b10063f41409ba13c
-
SSDEEP
49152:gMILTqFg07h0GJm30wMjiN7lAMOLSp3q2iK2JxEaaqNaUhAFCuMtZiXC8s2FDFkg:G
-
Quasar family
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-