General
-
Target
Synapse-X-Byfron-Bypass-robloxbyfronbypass.zip
-
Size
1.3MB
-
Sample
240510-vwyj8abg48
-
MD5
a4e0416932972885f3958cd07ee74c22
-
SHA1
e81ec083095e4236330df86eb89edd2a7f062bac
-
SHA256
b3d4ab07174a960a03b408f1ba2604c5e571b6275faecb3c53c202fb82150002
-
SHA512
c5ab34a56f8183e00de386512733f156c0c0ed8dd52cf387ec0d4b450b41a57d0d03015cf5ec0be8fda0cef6c14471ddc3cefca76556e504384ff3792230b2e6
-
SSDEEP
24576:XF+tHlRJBf0CeCzCnSX9P0oSmPkfdyvJ+sT0aM0p0hRU91+eonB+78x:XF+BlRJBfJe2CnE9MoSnyxtH1wM+eQj
Behavioral task
behavioral1
Sample
Synapse-X-Byfron-Bypass-robloxbyfronbypass.zip
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Synapse-X-Byfron-Bypass-robloxbyfronbypass.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Synapse-X-Byfron-Bypass-robloxbyfronbypass.zip
Resource
win11-20240426-en
Malware Config
Extracted
quasar
1.4.1
SynapseX
espiny-38468.portmap.host:38468
987e6177-8b62-48ea-8ca9-c699971b74ba
-
encryption_key
C7EC88A5CCB59BD73EF3F7D4787818BE89C06664
-
install_name
Boot 10.5.exe
-
log_directory
Windows Logs
-
reconnect_delay
3000
-
startup_key
Windows 10 Boot
-
subdirectory
Windows 10 Boot
Targets
-
-
Target
Synapse-X-Byfron-Bypass-robloxbyfronbypass.zip
-
Size
1.3MB
-
MD5
a4e0416932972885f3958cd07ee74c22
-
SHA1
e81ec083095e4236330df86eb89edd2a7f062bac
-
SHA256
b3d4ab07174a960a03b408f1ba2604c5e571b6275faecb3c53c202fb82150002
-
SHA512
c5ab34a56f8183e00de386512733f156c0c0ed8dd52cf387ec0d4b450b41a57d0d03015cf5ec0be8fda0cef6c14471ddc3cefca76556e504384ff3792230b2e6
-
SSDEEP
24576:XF+tHlRJBf0CeCzCnSX9P0oSmPkfdyvJ+sT0aM0p0hRU91+eonB+78x:XF+BlRJBfJe2CnE9MoSnyxtH1wM+eQj
Score1/10 -