General
-
Target
R0X-Built.exe
-
Size
409KB
-
Sample
240510-g8zq6afh4z
-
MD5
ca46bdb39ae5def0cbcb622d2daf18ee
-
SHA1
e4fade184792a622eecbb60e6e10affd9b1f9625
-
SHA256
ffb2649845e8ebbf318b01537f3bf87fa2f3ae48a0cc5109985abbfa7e2d4bce
-
SHA512
01d8ad45700c3a24a48806256a571e239f3d76c58820a9dfbea0d5a8429e0abd965e1ce16e5e8fc275b8b9769be44a987ed3caac7da313729221ec43c073ee0c
-
SSDEEP
6144:RMb9p1kREG60olEOs1ddczFPWoqKslar9Z5fRpna0bBQv4rd5aP70A6OocBA/e9t:epiREGJDOs1dqzJNqKlaQQocBA/e9km
Malware Config
Extracted
quasar
3.1.5
Slave
looking-memphis.gl.at.ply.gg:45119
$Sxr-3vDee7FzoJnhqjuE3n
-
encryption_key
0LYfxXR7fIiRTzixPrdb
-
install_name
$srr-powershell.exe
-
log_directory
Logs
-
reconnect_delay
1000
-
startup_key
$srr-powershell
-
subdirectory
Windows
Targets
-
-
Target
R0X-Built.exe
-
Size
409KB
-
MD5
ca46bdb39ae5def0cbcb622d2daf18ee
-
SHA1
e4fade184792a622eecbb60e6e10affd9b1f9625
-
SHA256
ffb2649845e8ebbf318b01537f3bf87fa2f3ae48a0cc5109985abbfa7e2d4bce
-
SHA512
01d8ad45700c3a24a48806256a571e239f3d76c58820a9dfbea0d5a8429e0abd965e1ce16e5e8fc275b8b9769be44a987ed3caac7da313729221ec43c073ee0c
-
SSDEEP
6144:RMb9p1kREG60olEOs1ddczFPWoqKslar9Z5fRpna0bBQv4rd5aP70A6OocBA/e9t:epiREGJDOs1dqzJNqKlaQQocBA/e9km
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-