General
-
Target
5a8434f899549874f8114dda6a6e2763.bin
-
Size
487KB
-
Sample
230920-bzw11sdc4w
-
MD5
04cf390094d8cdaec4e89a281056078c
-
SHA1
bd2984feb021ae8ffa90a40400b8a91568a564c5
-
SHA256
5ae5cbd5ef29c6386888ce1c5b15a44a07e27f6be64ca5c450d29745a2847e14
-
SHA512
0da92d449b9c7dff1382b9c7723a9b5d964e2ffcaf27eb0651686992ea463426bf96e875840d866d23664a968d528e860921a50e1ec6762afefa50090487fd32
-
SSDEEP
12288:IaHoqFlmRgUx2RiP+E1xNj8IVGeNCsXhU82mfGDZ8IHh4/V6Jui:I4uRO6+gecvXhU82mfG97Hh4oui
Behavioral task
behavioral1
Sample
83006c24730b2d7fb7506451aee3d6bb85cc27d64e230630bc66517c7ba9ed21.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
83006c24730b2d7fb7506451aee3d6bb85cc27d64e230630bc66517c7ba9ed21.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
quasar
2.7.0.0
Venom Client
crazydns.linkpc.net:3000
ER5Ojs5Por1j5joXR6
-
encryption_key
HHtj6qkHuyo7mzRB7Q0O
-
install_name
Venom.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Venom Client Startup
Targets
-
-
Target
83006c24730b2d7fb7506451aee3d6bb85cc27d64e230630bc66517c7ba9ed21.bin
-
Size
1.0MB
-
MD5
5a8434f899549874f8114dda6a6e2763
-
SHA1
5950904de381e2e16411b315ed91d683b11bd66e
-
SHA256
83006c24730b2d7fb7506451aee3d6bb85cc27d64e230630bc66517c7ba9ed21
-
SHA512
c6953fcaebd25e13c2d30362f60e3a2defc7c83e640b023f766dbbf305c30332d654d2882b8247126909f2bc994ec2268f0ee0e70a607d910a53b6ae8b98ed9b
-
SSDEEP
24576:Eaynkc1ZzBvtrZHFjMKY2GocjuN6Yelp+QlGVB/yqR:1ynkc1ZzBvtrZHFjMKY2kjuN6Yelpju
Score10/10-
Quasar payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-