General
-
Target
loadervmp.exe
-
Size
409KB
-
Sample
240601-jb8nxaeh27
-
MD5
14f056491baaed04872533c2d9648d46
-
SHA1
c48b08d0e9064f2d060f19474bb54cf3c5a25586
-
SHA256
018f75f18b882044109f250f19da654c0b3bd90430b318fcb03348908a189aae
-
SHA512
c109b1a9cf40049f8958beab9cff112cb326dd719c56f6dedafda4cf3a64d3faae3912f34cbcc1ee203a0316e40b8f7016624f05a1ad6c93bbaa0bdc9dc79b08
-
SSDEEP
6144:rMvlpdRJjGq/ldSTTIgiGwo9W0MFMJyb7+Ye0SmxalGcqwL6Ir4H9VI:EpbJjGu/STTIwJWIJgG0jFCRsH9VI
Behavioral task
behavioral1
Sample
loadervmp.exe
Resource
win7-20240419-en
Malware Config
Extracted
quasar
3.1.5
SeroXen
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
ZJpQQkxTrak9Zs9tUOQW
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Targets
-
-
Target
loadervmp.exe
-
Size
409KB
-
MD5
14f056491baaed04872533c2d9648d46
-
SHA1
c48b08d0e9064f2d060f19474bb54cf3c5a25586
-
SHA256
018f75f18b882044109f250f19da654c0b3bd90430b318fcb03348908a189aae
-
SHA512
c109b1a9cf40049f8958beab9cff112cb326dd719c56f6dedafda4cf3a64d3faae3912f34cbcc1ee203a0316e40b8f7016624f05a1ad6c93bbaa0bdc9dc79b08
-
SSDEEP
6144:rMvlpdRJjGq/ldSTTIgiGwo9W0MFMJyb7+Ye0SmxalGcqwL6Ir4H9VI:EpbJjGu/STTIwJWIJgG0jFCRsH9VI
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-