General
-
Target
Uni.exe
-
Size
409KB
-
Sample
240624-sqmjnayfjd
-
MD5
28a90307277122011920de004e149e2c
-
SHA1
0c3bc0d9338ce9129833d7bb8b3b6ebf41ef4a39
-
SHA256
5b584418db5a9302834272560b076a26ae5c882e253dd23d9c603bcdf4e235e7
-
SHA512
6c24cb5886c67a2c58219bfccb0816c136ba2d4d44792c40ca8482499974e2a9abd285af63a08d983aaaef2f7ab988a150a17bbecc903a109a8effee21092276
-
SSDEEP
6144:jMvlpdRJjGq/ld9zivfK2p7/PvmfD8MbLw5C7NP4TP6ENT/4e:MpbJjGuL9zivThPvm82wwyPhNTge
Behavioral task
behavioral1
Sample
Uni.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Uni.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
quasar
3.1.5
Loader Client
panel-slave.gl.at.ply.gg:57059
panel-slave.gl.at.ply.gg:27892
$Sxr-rpL8EItHN3pqIQQVy2
-
encryption_key
yeO4jNnQKA8amVjOSkeX
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SeroXen
-
subdirectory
SubDir
Targets
-
-
Target
Uni.exe
-
Size
409KB
-
MD5
28a90307277122011920de004e149e2c
-
SHA1
0c3bc0d9338ce9129833d7bb8b3b6ebf41ef4a39
-
SHA256
5b584418db5a9302834272560b076a26ae5c882e253dd23d9c603bcdf4e235e7
-
SHA512
6c24cb5886c67a2c58219bfccb0816c136ba2d4d44792c40ca8482499974e2a9abd285af63a08d983aaaef2f7ab988a150a17bbecc903a109a8effee21092276
-
SSDEEP
6144:jMvlpdRJjGq/ld9zivfK2p7/PvmfD8MbLw5C7NP4TP6ENT/4e:MpbJjGuL9zivThPvm82wwyPhNTge
Score10/10-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-