General
-
Target
Uni.exe
-
Size
409KB
-
Sample
240519-hjbhpsfa57
-
MD5
885cfc4fc32053f0dc1cb8dbf50b8c7c
-
SHA1
9ea9a3529c159ace497a8bf2af5364004a019ba8
-
SHA256
5eef436f510c0d49d022b096d0717b75cf35e93917dbb5c632c83bf66d4cbb16
-
SHA512
2052781f4e56d8db075040d0bc0638be8a529bbdcfe765025ee5351c045ce8a570283c83bbee7f94aac3c913f0e5ba841e9a14a6a3349a097d59ff0c1b2d6f95
-
SSDEEP
6144:kMg2pJAJcC0B6gMBZ5T/cw+/Ew2azbs69yS79RII2ir7dO1sR:TpyJcC+7MBZ5T/O/ESxySBV2i3g1sR
Malware Config
Extracted
quasar
3.1.5
SeroXen
releases-towards.gl.at.ply.gg:56527
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
hmoGJBcviPbEpJOEXtE4
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Targets
-
-
Target
Uni.exe
-
Size
409KB
-
MD5
885cfc4fc32053f0dc1cb8dbf50b8c7c
-
SHA1
9ea9a3529c159ace497a8bf2af5364004a019ba8
-
SHA256
5eef436f510c0d49d022b096d0717b75cf35e93917dbb5c632c83bf66d4cbb16
-
SHA512
2052781f4e56d8db075040d0bc0638be8a529bbdcfe765025ee5351c045ce8a570283c83bbee7f94aac3c913f0e5ba841e9a14a6a3349a097d59ff0c1b2d6f95
-
SSDEEP
6144:kMg2pJAJcC0B6gMBZ5T/cw+/Ew2azbs69yS79RII2ir7dO1sR:TpyJcC+7MBZ5T/O/ESxySBV2i3g1sR
-
Quasar payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-