General
-
Target
test.bat
-
Size
7.7MB
-
Sample
250205-a1n65askdr
-
MD5
22070488e8b05fa3d1555e35cb02e2c4
-
SHA1
17affd9bceb5b254a65f2b918008118b3e771f5d
-
SHA256
f9265a0554ffd7971bacbd4335ab32109aa2f8ba7f70dba315f4e1f48674b990
-
SHA512
2db6d0ea121b100e0a2d69d93062f794ef52332139f67355a808cdf4310265575b17e62e3a6b2fe306a4ed8879a781bd203fc18cda7c074e0ded57c79528f0e6
-
SSDEEP
49152:E1Knuw9suLZqlYvKn2jUftGqD68t0vgVuX3e/YI7G6YLgkHB6yNKvNBynnHeZhCN:P
Static task
static1
Behavioral task
behavioral1
Sample
test.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
test.bat
Resource
win10v2004-20250129-en
Malware Config
Extracted
quasar
1.4.0
v15.0 | Fifa23
private123.duckdns.org:8808
dofucks.com:8808
c398e98c-136e-4007-ab40-e179829f338c
-
encryption_key
C84CB6134701741C5122A14FACDB67C8CFA9C0AB
-
install_name
.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
$sxr-seroxen
Targets
-
-
Target
test.bat
-
Size
7.7MB
-
MD5
22070488e8b05fa3d1555e35cb02e2c4
-
SHA1
17affd9bceb5b254a65f2b918008118b3e771f5d
-
SHA256
f9265a0554ffd7971bacbd4335ab32109aa2f8ba7f70dba315f4e1f48674b990
-
SHA512
2db6d0ea121b100e0a2d69d93062f794ef52332139f67355a808cdf4310265575b17e62e3a6b2fe306a4ed8879a781bd203fc18cda7c074e0ded57c79528f0e6
-
SSDEEP
49152:E1Knuw9suLZqlYvKn2jUftGqD68t0vgVuX3e/YI7G6YLgkHB6yNKvNBynnHeZhCN:P
Score10/10-
Quasar family
-
Quasar payload
-
Seroxen family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-