General
-
Target
Uni.exe
-
Size
409KB
-
Sample
240512-xyp2zacb3s
-
MD5
a9992c5f2a2abd7200e02870adf941ec
-
SHA1
8a129b6b673a1101f5237d855afa2f304eb3243c
-
SHA256
c33f54f474ed1ee7aabaeb1519fab4abcd37807524164bcef2d53d5e7389377d
-
SHA512
226202be4d51f2703bdb201c4347c0bc67e1426900561abd2f706a0df3cb401bab64805bf33b3c8fb77e1a9a4a8c92d69bb544ae2da9df98b2874c42dc4f6e1b
-
SSDEEP
6144:MMr2pJAJcC0B6x5BA0kFda2UFw43YKqb/OMrtylMJb1nCD8aXh:8pyJcC+a5BA0kF/U50OMROQb9vaXh
Malware Config
Extracted
quasar
3.1.5
SLAVE
review-tops.gl.at.ply.gg:48212
$Sxr-IGnkORFTlshRl7BdTw
-
encryption_key
YDmRBA8wExjQkYgGrHhN
-
install_name
$sxr-powershell.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Discord
-
subdirectory
$77
Targets
-
-
Target
Uni.exe
-
Size
409KB
-
MD5
a9992c5f2a2abd7200e02870adf941ec
-
SHA1
8a129b6b673a1101f5237d855afa2f304eb3243c
-
SHA256
c33f54f474ed1ee7aabaeb1519fab4abcd37807524164bcef2d53d5e7389377d
-
SHA512
226202be4d51f2703bdb201c4347c0bc67e1426900561abd2f706a0df3cb401bab64805bf33b3c8fb77e1a9a4a8c92d69bb544ae2da9df98b2874c42dc4f6e1b
-
SSDEEP
6144:MMr2pJAJcC0B6x5BA0kFda2UFw43YKqb/OMrtylMJb1nCD8aXh:8pyJcC+a5BA0kF/U50OMROQb9vaXh
-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-