General

  • Target

    svchost.exe

  • Size

    409KB

  • MD5

    e8d65fc5ddc235ab81a78b0caebe13c8

  • SHA1

    f2200ae68ba21fbbf7e854281e4ab636e3a256e3

  • SHA256

    41ed0732dc7032c3e345ea7dfa9522803d2b306e1ef149ebdd74f7ecfe9f17e8

  • SHA512

    afe6cf22e57eac8589d1e2fbf198eee75795969a5f2e81a804a2569e411a16a161d618e7edc2b816ec55b0bfba4ea9c33f017af51d6f382076c517ab7b93f30c

  • SSDEEP

    12288:qpiREGJMIexhVD+R5aa9vM4DRShuISW2JM:uwpJUi39vM4DRAuQ

Malware Config

Extracted

Family

quasar

Version

3.1.5

Botnet

SeroXen | v3.1.5 |

C2

dating-mpegs.gl.at.ply.gg:6566

Mutex

$Sxr-jy6vh8CtEJL5ceZuIb

Attributes
  • encryption_key

    M1SAZZUtbnQqZ8RvEnLb

  • install_name

    $sxr-powershell.exe

  • log_directory

    $sxr-Logs

  • reconnect_delay

    3000

  • startup_key

    Powershell

  • subdirectory

    $sxr-seroxen2

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • svchost.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections