General
-
Target
Seron.exe
-
Size
3.1MB
-
Sample
241225-3hk1za1mhv
-
MD5
3d3c3272d41c20dd8a12826e75af36a9
-
SHA1
33f41b11b07bb5bfd07b6eefc1df6b898e1d052f
-
SHA256
e54a374dac36e9aa6ca9cfcb32b2828bdff03411259adddbbd3a032465843b52
-
SHA512
3700538f7796f5254c0c5ef7be1f43e117ad65af2836dc2d6ec5faaa99651b4796bab77b53118e5ce24032540a5674df7027709a762a305b6007c9126ca417ef
-
SSDEEP
49152:DvqlL26AaNeWgPhlmVqvMQ7XSKDS8wbR4LoGdzTHHB72eh2NT:DvSL26AaNeWgPhlmVqkQ7XSKDS83
Behavioral task
behavioral1
Sample
Seron.exe
Resource
win7-20240729-en
Malware Config
Extracted
quasar
1.4.1
Seron
a4hrb4kc9z-59858.portmap.host:59858
2ac9af47-8868-455d-8ff0-aea73f3bb28f
-
encryption_key
8BD9150EEC3DA71ED82080D7AEB7C165A58C889F
-
install_name
vn3gqb4ZDoPYX3.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
sKnqGpLs82z7bl
-
subdirectory
SubDir
Targets
-
-
Target
Seron.exe
-
Size
3.1MB
-
MD5
3d3c3272d41c20dd8a12826e75af36a9
-
SHA1
33f41b11b07bb5bfd07b6eefc1df6b898e1d052f
-
SHA256
e54a374dac36e9aa6ca9cfcb32b2828bdff03411259adddbbd3a032465843b52
-
SHA512
3700538f7796f5254c0c5ef7be1f43e117ad65af2836dc2d6ec5faaa99651b4796bab77b53118e5ce24032540a5674df7027709a762a305b6007c9126ca417ef
-
SSDEEP
49152:DvqlL26AaNeWgPhlmVqvMQ7XSKDS8wbR4LoGdzTHHB72eh2NT:DvSL26AaNeWgPhlmVqkQ7XSKDS83
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-