General
-
Target
UD.exe
-
Size
3.1MB
-
Sample
230529-xmg7zsde41
-
MD5
8eeb2a1b1c1f5abb96801789585eb940
-
SHA1
4ad1d0f1a048ba9615dccd16fae6526180365499
-
SHA256
b6d5b869720645aefed2e060c1828fa54bfb4faedbe9bebc5d41928110b2ab2d
-
SHA512
62f216a6920f393ab9a68a8dc83b8559fe4ef3a770a092ec4f046a189bf57a10cb2a43a8c1299b828ad5cde62f2415e510af47f94b49fa9e0f510b0b0b4bf4a2
-
SSDEEP
49152:yvFt62XlaSFNWPjljiFa2RoUYIXQRJ6mbR3LoGdPNTHHB72eh2NT:yv362XlaSFNWPjljiFXRoUYIXQRJ6g
Behavioral task
behavioral1
Sample
UD.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
UD.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
quasar
1.4.1
ReServices
bobbawb1000.duckdns.org:59955
a97b7b05-f9a6-4a97-9f99-a2119823cf8f
-
encryption_key
B451C26057A2AEFC83990793720D2316EA48C49A
-
install_name
renservice.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
renservice
-
subdirectory
servicerenk
Targets
-
-
Target
UD.exe
-
Size
3.1MB
-
MD5
8eeb2a1b1c1f5abb96801789585eb940
-
SHA1
4ad1d0f1a048ba9615dccd16fae6526180365499
-
SHA256
b6d5b869720645aefed2e060c1828fa54bfb4faedbe9bebc5d41928110b2ab2d
-
SHA512
62f216a6920f393ab9a68a8dc83b8559fe4ef3a770a092ec4f046a189bf57a10cb2a43a8c1299b828ad5cde62f2415e510af47f94b49fa9e0f510b0b0b4bf4a2
-
SSDEEP
49152:yvFt62XlaSFNWPjljiFa2RoUYIXQRJ6mbR3LoGdPNTHHB72eh2NT:yv362XlaSFNWPjljiFXRoUYIXQRJ6g
Score10/10-
Quasar payload
-
Executes dropped EXE
-