General
-
Target
phantomX loader.exe
-
Size
3.3MB
-
Sample
241204-yfkvzatlan
-
MD5
8ac22fce32688203c5857e972a48c47c
-
SHA1
6808d49fe912bfe43b2d4fb6456c7da51fff9f5a
-
SHA256
9a822779bda311ccef9b3d2f88a75ebeb2f5113d2b45d5ed7a0d25a35c3fd8e5
-
SHA512
968f1d55159e59b753583eb88627ca0d392f92a753154633f95ef598aca32fa1e134aa5b7d7c42007fbfcca1fa74f084a19f2856b5b341a7a205601e957aba34
-
SSDEEP
98304:lv+L26AaNeWgPhlmVqkQ7XSK4Sk8/eFb:J+4Sf8G
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.0.48:4782
33376e96-8fb8-4154-bd0a-fd0f58f69afe
-
encryption_key
9DE7C466D5C89B4DCD53772026AFA9FDFA35108F
-
install_name
phantomX injector.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
phantomX loader.exe
-
Size
3.3MB
-
MD5
8ac22fce32688203c5857e972a48c47c
-
SHA1
6808d49fe912bfe43b2d4fb6456c7da51fff9f5a
-
SHA256
9a822779bda311ccef9b3d2f88a75ebeb2f5113d2b45d5ed7a0d25a35c3fd8e5
-
SHA512
968f1d55159e59b753583eb88627ca0d392f92a753154633f95ef598aca32fa1e134aa5b7d7c42007fbfcca1fa74f084a19f2856b5b341a7a205601e957aba34
-
SSDEEP
98304:lv+L26AaNeWgPhlmVqkQ7XSK4Sk8/eFb:J+4Sf8G
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-