General
-
Target
https://github.com/ErroHacker/SeroXen_Cracked
-
Sample
240520-ch4j7see98
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/ErroHacker/SeroXen_Cracked
Resource
win10v2004-20240508-en
windows10-2004-x64
18 signatures
300 seconds
Malware Config
Extracted
Family
quasar
Version
1.0.0.0
Botnet
v2.2.5 | SeroXen
C2
kimsoylak.ddns.net:4782
Mutex
2cc9d61f-950d-4f23-b7d5-45d9dda2f256
Attributes
-
encryption_key
F467D794B2E1081B6AD1EAD5813AFA74F053248D
-
install_name
.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
1
Targets
-
-
Target
https://github.com/ErroHacker/SeroXen_Cracked
Score10/10-
Quasar payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-