General
-
Target
XWorm V3.1.exe
-
Size
7.0MB
-
Sample
230319-zv3vrscb7x
-
MD5
e0b3a2c3df9a18ad71e1293a3195cadf
-
SHA1
f48a0d2c47f1db77457e894d4e72bb3ddd6b0691
-
SHA256
7786135b3cd7225c0fd83b1fc05efb702ae015d124326dfb4947d4e2addaab69
-
SHA512
b2c091d50902ed44f7de80ec84bff8894bee0fce5ac0e53536048ae8d6cfc0c719771dab7ae5f585cd608fe86f50d8c25219faa7daef7720d0f2b557a9af972e
-
SSDEEP
196608:Nn1Q6B/XKUDz9NoUXJzUWi7MYjBVvo5/km:N1FlaU/9NZXJZinjB9oxj
Malware Config
Extracted
gozi
Extracted
quasar
1.4.0
v15.5.0 | C5Patcher
blue-fog-95386.pktriot.net:22781
41e6efe6-1856-4679-a9f1-4f99d8236ac2
-
encryption_key
313B7CC078756BA4565679A48877BC516AC41AF4
-
install_name
.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
$sxr-seroxen
Targets
-
-
Target
XWorm V3.1.exe
-
Size
7.0MB
-
MD5
e0b3a2c3df9a18ad71e1293a3195cadf
-
SHA1
f48a0d2c47f1db77457e894d4e72bb3ddd6b0691
-
SHA256
7786135b3cd7225c0fd83b1fc05efb702ae015d124326dfb4947d4e2addaab69
-
SHA512
b2c091d50902ed44f7de80ec84bff8894bee0fce5ac0e53536048ae8d6cfc0c719771dab7ae5f585cd608fe86f50d8c25219faa7daef7720d0f2b557a9af972e
-
SSDEEP
196608:Nn1Q6B/XKUDz9NoUXJzUWi7MYjBVvo5/km:N1FlaU/9NZXJZinjB9oxj
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Executes dropped EXE
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-