General
-
Target
InfinityMAIN.exe
-
Size
139KB
-
Sample
240517-s3wyvsee29
-
MD5
89a81ce88efea77c89dc6751ddceede5
-
SHA1
59ad203c7cf17fcebfc99803574de062b835e312
-
SHA256
d22e09acb86be908009f819325910e6ecad7bc0ba35df06f11cd7e8fa9ab5426
-
SHA512
9007815d55ca0b7dcf3c3aa0398b20ede84d9d141463f2c99ed62f87225e5d15043afbd1af3745247e57ffdd5f522e5aabab21ca7637699645ec477432895e58
-
SSDEEP
3072:ZiS4omp03WQthI/US3BZC0EiRQ1G78IVn2tbSkcJU8lt0:ZiS4ompBUS3BZC0C1G78IVEc6ct
Static task
static1
Behavioral task
behavioral1
Sample
InfinityMAIN.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.4.1
PoofNRico
nahchris-49021.portmap.host:49021
1a5d095f-2c59-4b3f-b053-5bd928b2e541
-
encryption_key
ADBAB4BC16998E7E1913E54C27829FE47C72BE6D
-
install_name
PlutoBETAv2.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
DiscordUpdater.exe
-
subdirectory
PlutoBETAv2
Targets
-
-
Target
InfinityMAIN.exe
-
Size
139KB
-
MD5
89a81ce88efea77c89dc6751ddceede5
-
SHA1
59ad203c7cf17fcebfc99803574de062b835e312
-
SHA256
d22e09acb86be908009f819325910e6ecad7bc0ba35df06f11cd7e8fa9ab5426
-
SHA512
9007815d55ca0b7dcf3c3aa0398b20ede84d9d141463f2c99ed62f87225e5d15043afbd1af3745247e57ffdd5f522e5aabab21ca7637699645ec477432895e58
-
SSDEEP
3072:ZiS4omp03WQthI/US3BZC0EiRQ1G78IVn2tbSkcJU8lt0:ZiS4ompBUS3BZC0C1G78IVEc6ct
-
Quasar payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-