General

  • Target

    Synapse-X-Byfron-Bypass-robloxbyfronbypass.zip

  • Size

    1.3MB

  • Sample

    240510-vwyj8abg48

  • MD5

    a4e0416932972885f3958cd07ee74c22

  • SHA1

    e81ec083095e4236330df86eb89edd2a7f062bac

  • SHA256

    b3d4ab07174a960a03b408f1ba2604c5e571b6275faecb3c53c202fb82150002

  • SHA512

    c5ab34a56f8183e00de386512733f156c0c0ed8dd52cf387ec0d4b450b41a57d0d03015cf5ec0be8fda0cef6c14471ddc3cefca76556e504384ff3792230b2e6

  • SSDEEP

    24576:XF+tHlRJBf0CeCzCnSX9P0oSmPkfdyvJ+sT0aM0p0hRU91+eonB+78x:XF+BlRJBfJe2CnE9MoSnyxtH1wM+eQj

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

SynapseX

C2

espiny-38468.portmap.host:38468

Mutex

987e6177-8b62-48ea-8ca9-c699971b74ba

Attributes
  • encryption_key

    C7EC88A5CCB59BD73EF3F7D4787818BE89C06664

  • install_name

    Boot 10.5.exe

  • log_directory

    Windows Logs

  • reconnect_delay

    3000

  • startup_key

    Windows 10 Boot

  • subdirectory

    Windows 10 Boot

Targets

    • Target

      Synapse-X-Byfron-Bypass-robloxbyfronbypass.zip

    • Size

      1.3MB

    • MD5

      a4e0416932972885f3958cd07ee74c22

    • SHA1

      e81ec083095e4236330df86eb89edd2a7f062bac

    • SHA256

      b3d4ab07174a960a03b408f1ba2604c5e571b6275faecb3c53c202fb82150002

    • SHA512

      c5ab34a56f8183e00de386512733f156c0c0ed8dd52cf387ec0d4b450b41a57d0d03015cf5ec0be8fda0cef6c14471ddc3cefca76556e504384ff3792230b2e6

    • SSDEEP

      24576:XF+tHlRJBf0CeCzCnSX9P0oSmPkfdyvJ+sT0aM0p0hRU91+eonB+78x:XF+BlRJBfJe2CnE9MoSnyxtH1wM+eQj

    Score
    1/10

MITRE ATT&CK Matrix

Tasks