General
-
Target
Nemoxen.exe
-
Size
676KB
-
Sample
241129-tndz6syqhk
-
MD5
fd73b0b44b2d461b5f9fb9a8180de4be
-
SHA1
a22b3c1d4a77c8235a571229ce7f0aba31af9132
-
SHA256
8efc6505cd59fe757f371ff542e6a8b24ec29f8afb044c5dc32522e23a6cf4cb
-
SHA512
7665831e06ecab15114b391835d2a5df9dd7a3bcf05f63b6319f7260b7ea1cb97a9fa522cfe65563c48cc882a72ee004ba1b6392ce381008361a397e3b27871e
-
SSDEEP
12288:jTEgdfY2xUscjiez4EywIdp+sc8cdd+8:8UwQQrywIdpjcd48
Behavioral task
behavioral1
Sample
Nemoxen.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.0
Neoxen
i92.168.0.42:4782
5e5c2635-6e73-4945-84d1-6fff2a604503
-
encryption_key
4D634613C08A5953B861CE48D768ABEFCD1484A3
-
install_name
coolpro12.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Neoxen
-
subdirectory
SubDir
Targets
-
-
Target
Nemoxen.exe
-
Size
676KB
-
MD5
fd73b0b44b2d461b5f9fb9a8180de4be
-
SHA1
a22b3c1d4a77c8235a571229ce7f0aba31af9132
-
SHA256
8efc6505cd59fe757f371ff542e6a8b24ec29f8afb044c5dc32522e23a6cf4cb
-
SHA512
7665831e06ecab15114b391835d2a5df9dd7a3bcf05f63b6319f7260b7ea1cb97a9fa522cfe65563c48cc882a72ee004ba1b6392ce381008361a397e3b27871e
-
SSDEEP
12288:jTEgdfY2xUscjiez4EywIdp+sc8cdd+8:8UwQQrywIdpjcd48
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-