General
-
Target
Client-deobf.exe.bin
-
Size
3.1MB
-
Sample
240323-2zjzkagc4z
-
MD5
d7471180a1a335178c8062f57e2238f2
-
SHA1
f3e821ce5d1769feb271408746dbccb39e17a9ec
-
SHA256
520d3a1acd104bda412c4b6b118b2c4177fa5ae9c0294c18d8d81a5c604e946f
-
SHA512
420eef19289b550a2cdac7227e6c82ceff3e570bd2d37dadcd617804d16492913ecd7acef84d7962e1b081fe701bc3f609728e765a1829b8f597092c51dc6a84
-
SSDEEP
49152:H9taZ7HYaFI1ITamlivhumFgWdFxUhxGqTHHB72eh2NT:H9tapHYaFI1ITamliJumFg0x
Behavioral task
behavioral1
Sample
Client-deobf.exe
Resource
win7-20240220-en
Malware Config
Extracted
quasar
1.4.1
Slave
140.238.91.110:34353
25ab9d56-6ef2-47d3-99aa-2142fbcd41fa
-
encryption_key
8E710985199C6BF86CCE90DA92448A36E2F45F51
-
install_name
XWormV5.6.exe
-
log_directory
WindowsUPDLogs
-
reconnect_delay
3000
-
startup_key
Windows BIOS Update Checker
-
subdirectory
SubDir
Targets
-
-
Target
Client-deobf.exe.bin
-
Size
3.1MB
-
MD5
d7471180a1a335178c8062f57e2238f2
-
SHA1
f3e821ce5d1769feb271408746dbccb39e17a9ec
-
SHA256
520d3a1acd104bda412c4b6b118b2c4177fa5ae9c0294c18d8d81a5c604e946f
-
SHA512
420eef19289b550a2cdac7227e6c82ceff3e570bd2d37dadcd617804d16492913ecd7acef84d7962e1b081fe701bc3f609728e765a1829b8f597092c51dc6a84
-
SSDEEP
49152:H9taZ7HYaFI1ITamlivhumFgWdFxUhxGqTHHB72eh2NT:H9tapHYaFI1ITamliJumFg0x
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-