General
-
Target
TangoGenV1.3.EXE
-
Size
52.0MB
-
Sample
240404-t1xytadb47
-
MD5
e9150812ffb2317a7ff1a2491a392ade
-
SHA1
6b929ee7d7555604ec71d2463b6c1602aaf38b75
-
SHA256
0e01eb02101b4aa05e0484ac9caebb77a7ecda7a36263aac8a32225fa2a8d38a
-
SHA512
7a7a5c6c29848e5a2f1c12753c6bf9900937b99fd5e07cfb6fc6793216361bc7962fbd0a2b29448bae1c028ab93c11640f176cf5d3897a64973dd954ff417914
-
SSDEEP
1572864:CxLPRJ/aHOlj/wZuj/hzJHW2ldP2dUOpfa4X62AC:CH2Mhzn+dUSh
Static task
static1
Behavioral task
behavioral1
Sample
TangoGenV1.3.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
quasar
1.4.1
Office04
6.tcp.ngrok.io:16799
0c20af10-1b0a-4d0e-bbca-3718ee39e827
-
encryption_key
284202D1B7ED732612BB54048953C4453A2549F9
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System32
-
subdirectory
SubDir
Extracted
xenorat
6.tcp.ngrok.io
fdsfdsfsdfsdfnd8912d
-
delay
1000
-
install_path
appdata
-
port
17147
-
startup_name
Intel Processor ©
Targets
-
-
Target
TangoGenV1.3.EXE
-
Size
52.0MB
-
MD5
e9150812ffb2317a7ff1a2491a392ade
-
SHA1
6b929ee7d7555604ec71d2463b6c1602aaf38b75
-
SHA256
0e01eb02101b4aa05e0484ac9caebb77a7ecda7a36263aac8a32225fa2a8d38a
-
SHA512
7a7a5c6c29848e5a2f1c12753c6bf9900937b99fd5e07cfb6fc6793216361bc7962fbd0a2b29448bae1c028ab93c11640f176cf5d3897a64973dd954ff417914
-
SSDEEP
1572864:CxLPRJ/aHOlj/wZuj/hzJHW2ldP2dUOpfa4X62AC:CH2Mhzn+dUSh
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-