General
-
Target
SynapseX.exe
-
Size
3.1MB
-
Sample
240602-lhz2fsaa56
-
MD5
674a2f40a3cfdeb19b4787406f9f947b
-
SHA1
2fb5232fe4c078a35270aca9dc57f7f8f69b0328
-
SHA256
790c606fd4e39779b55dacfaa684be5aea2cd3cebd9b26f089c3498399b4b757
-
SHA512
feab371f1cd8adbd45e560329f4353a91b176a9b5897bf803633ea9f13698a6c6b67c38466f0077f3c93ff0a06467bf43e32a5e1a4ee9d623878f6177d1c918c
-
SSDEEP
49152:3v6lL26AaNeWgPhlmVqvMQ7XSKWCS21J/LoGd+THHB72eh2NT:3viL26AaNeWgPhlmVqkQ7XSKWCSG
Behavioral task
behavioral1
Sample
SynapseX.exe
Resource
win7-20240220-en
Malware Config
Extracted
quasar
1.4.1
Chase
Synapsedoggystyle-51191.portmap.host:51191
bfe1d049-722e-41ed-b777-d417eb22f6e7
-
encryption_key
33F77912B4CF70A0AD1E582014B5294301E27672
-
install_name
Synapase.exe
-
log_directory
Windows Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
document
Targets
-
-
Target
SynapseX.exe
-
Size
3.1MB
-
MD5
674a2f40a3cfdeb19b4787406f9f947b
-
SHA1
2fb5232fe4c078a35270aca9dc57f7f8f69b0328
-
SHA256
790c606fd4e39779b55dacfaa684be5aea2cd3cebd9b26f089c3498399b4b757
-
SHA512
feab371f1cd8adbd45e560329f4353a91b176a9b5897bf803633ea9f13698a6c6b67c38466f0077f3c93ff0a06467bf43e32a5e1a4ee9d623878f6177d1c918c
-
SSDEEP
49152:3v6lL26AaNeWgPhlmVqvMQ7XSKWCS21J/LoGd+THHB72eh2NT:3viL26AaNeWgPhlmVqkQ7XSKWCSG
-
Quasar payload
-
Executes dropped EXE
-