General
-
Target
Uni.exe
-
Size
409KB
-
Sample
240530-qejmhsag89
-
MD5
78f15f52152da9355915d646d5f4f1e6
-
SHA1
514623af0d40968570977bb0993bc775b5dcb6cb
-
SHA256
6526c22d7ce386857149b6b5615c1c24cab7691496a1d3d849ead5d3e0b7b0c7
-
SHA512
13752ce045c2f7f0be187a6688b4032579fce7f17e8b77f66f192ee472aa58e60a1c5ea34dd85cb704e621afe4f228df880536159a7a907c41fbfeba3180a87d
-
SSDEEP
12288:ypbJjGukXuXQiwWlaJKwuKOASp2uLBUS:2VauOWERPIpB
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
PXEHWy52mqnqS2Hd39SK
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Targets
-
-
Target
Uni.exe
-
Size
409KB
-
MD5
78f15f52152da9355915d646d5f4f1e6
-
SHA1
514623af0d40968570977bb0993bc775b5dcb6cb
-
SHA256
6526c22d7ce386857149b6b5615c1c24cab7691496a1d3d849ead5d3e0b7b0c7
-
SHA512
13752ce045c2f7f0be187a6688b4032579fce7f17e8b77f66f192ee472aa58e60a1c5ea34dd85cb704e621afe4f228df880536159a7a907c41fbfeba3180a87d
-
SSDEEP
12288:ypbJjGukXuXQiwWlaJKwuKOASp2uLBUS:2VauOWERPIpB
-
Quasar payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-