General
-
Target
Client-built.exe
-
Size
3.1MB
-
Sample
240601-3kw61sbe35
-
MD5
dd2f556310eccb91f1b3a3b3d7c52c44
-
SHA1
c0032a0894ea23bba4dc36e37dd26eca25e1ac81
-
SHA256
3797626bb8fb9703283002f9fe59c8e0b55292a180efdae1b8b3faace9f6c899
-
SHA512
79a11a3154894485cec74c202105653deb1c53d19ef26f1b33214fda58e52a01774f3c6d332c8068a94c08ffa2afc02c8dca8d2ad10c2d98d219792ab019f1a3
-
SSDEEP
49152:zvelL26AaNeWgPhlmVqvMQ7XSKOqRJ6kbR3LoGd9uTHHB72eh2NT:zvOL26AaNeWgPhlmVqkQ7XSKOqRJ6u
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
quasar
1.4.1
FUD
runderscore00-61208.portmap.host:61208
41104e3a-44c7-4cb0-8bde-1a3c82e695fa
-
encryption_key
0185F96AF587188E173301C437AB89C8912A9718
-
install_name
$sxr-powershell.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
-
startup_key
Powershell
-
subdirectory
$sxr-seroxen2
Targets
-
-
Target
Client-built.exe
-
Size
3.1MB
-
MD5
dd2f556310eccb91f1b3a3b3d7c52c44
-
SHA1
c0032a0894ea23bba4dc36e37dd26eca25e1ac81
-
SHA256
3797626bb8fb9703283002f9fe59c8e0b55292a180efdae1b8b3faace9f6c899
-
SHA512
79a11a3154894485cec74c202105653deb1c53d19ef26f1b33214fda58e52a01774f3c6d332c8068a94c08ffa2afc02c8dca8d2ad10c2d98d219792ab019f1a3
-
SSDEEP
49152:zvelL26AaNeWgPhlmVqvMQ7XSKOqRJ6kbR3LoGd9uTHHB72eh2NT:zvOL26AaNeWgPhlmVqkQ7XSKOqRJ6u
-
Quasar payload
-
Executes dropped EXE
-