General
-
Target
Seron.exe
-
Size
3.1MB
-
Sample
241226-kyzj7a1req
-
MD5
cc69f02e1ef447e7fa8b720c8854f9fd
-
SHA1
f76a656e845e5e13b0cea87e46574d1445def0fa
-
SHA256
45523a903ee180f9e3951b007ca8bba84783f0bd986c2a1a351255e47d7e77a3
-
SHA512
230cc521b8b8a287542186cf681b810835bd2d380fd4c19ac4ee316145d6ba9a7460065dc428d486b26d6baa8df54a97f4c10519e5dc8091a0309ed2ea2f4d7b
-
SSDEEP
49152:nvelL26AaNeWgPhlmVqvMQ7XSKyKRJ60bR3LoGdoJATHHB72eh2NT:nvOL26AaNeWgPhlmVqkQ7XSKyKRJ6+M
Behavioral task
behavioral1
Sample
Seron.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Seron
a4hrb4kc9z-59858.portmap.host:59858
2ac9af47-8868-455d-8ff0-aea73f3bb28f
-
encryption_key
8BD9150EEC3DA71ED82080D7AEB7C165A58C889F
-
install_name
i8zbCLcf2xHsS2.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
i8zbCLcf2xHsS2
-
subdirectory
SubDir
Targets
-
-
Target
Seron.exe
-
Size
3.1MB
-
MD5
cc69f02e1ef447e7fa8b720c8854f9fd
-
SHA1
f76a656e845e5e13b0cea87e46574d1445def0fa
-
SHA256
45523a903ee180f9e3951b007ca8bba84783f0bd986c2a1a351255e47d7e77a3
-
SHA512
230cc521b8b8a287542186cf681b810835bd2d380fd4c19ac4ee316145d6ba9a7460065dc428d486b26d6baa8df54a97f4c10519e5dc8091a0309ed2ea2f4d7b
-
SSDEEP
49152:nvelL26AaNeWgPhlmVqvMQ7XSKyKRJ60bR3LoGdoJATHHB72eh2NT:nvOL26AaNeWgPhlmVqkQ7XSKyKRJ6+M
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-