General
-
Target
Nemoxen.exe
-
Size
676KB
-
Sample
241129-thh2yatrf1
-
MD5
0af0a6cf3d6aa2d46cddbe43bc543e3c
-
SHA1
b6626edb5a410a7e8fb054d77e9ae77e0bbb92ce
-
SHA256
435a89b57a238ca9ac57a93519017010d9cb1ced152cb4a51defd9b429314021
-
SHA512
37c860181269f4233cd3ecdb77b77ec336fb95f5e6c845f8a09c1c126bda3fa06806f69d095fa837642597ac672cb6b8dd113ffac319601cf345248d89b859c3
-
SSDEEP
12288:zTEgdfYwbgf9Ip94Iyw4XpRJj0YDlRcdN+8:MUwzyRyw4XpRh0Qcdo8
Malware Config
Extracted
quasar
1.4.0
Neoxen
192.168.0.42:4782
192.168.56.1:4782
5e5c2635-6e73-4945-84d1-6fff2a604503
-
encryption_key
4D634613C08A5953B861CE48D768ABEFCD1484A3
-
install_name
coolpro12.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Neoxen
-
subdirectory
SubDir
Targets
-
-
Target
Nemoxen.exe
-
Size
676KB
-
MD5
0af0a6cf3d6aa2d46cddbe43bc543e3c
-
SHA1
b6626edb5a410a7e8fb054d77e9ae77e0bbb92ce
-
SHA256
435a89b57a238ca9ac57a93519017010d9cb1ced152cb4a51defd9b429314021
-
SHA512
37c860181269f4233cd3ecdb77b77ec336fb95f5e6c845f8a09c1c126bda3fa06806f69d095fa837642597ac672cb6b8dd113ffac319601cf345248d89b859c3
-
SSDEEP
12288:zTEgdfYwbgf9Ip94Iyw4XpRJj0YDlRcdN+8:MUwzyRyw4XpRh0Qcdo8
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-