General
-
Target
Seron_protected.exe
-
Size
2.3MB
-
Sample
241228-lcy7zaxkex
-
MD5
a1e7539d32cd463c86540e00607e274b
-
SHA1
537b182c080ddd6fa8e89b31d67297abf7aef554
-
SHA256
828b9961731797b0a487f095d9980d3771599eb54feab35d1e856b925558e61a
-
SHA512
33c8ff00732e04a360c57aef401467f54a649563c5820c81c19b5de1607102bd9c29c65ca4f8c914885a0031b0c415339efa01122fbda58e17d8ff632d48b567
-
SSDEEP
49152:M55We0VQ+028J5gyUjjp5bCt7S275L6MP/J2H76gYSt98H9Y08ChNB/n:M55We0VCN6jjp5bC5Ft6MX4H76XStCdz
Static task
static1
Behavioral task
behavioral1
Sample
Seron_protected.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
quasar
1.4.1
Seron
nigeboc465-58875.portmap.host:58875
eb8602ec-8a0d-4322-b9a0-544571be5a2d
-
encryption_key
8BD9150EEC3DA71ED82080D7AEB7C165A58C889F
-
install_name
f8mk7ZGwVUpulm.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
f8mk7ZGwVUpulm
-
subdirectory
SubDir
Targets
-
-
Target
Seron_protected.exe
-
Size
2.3MB
-
MD5
a1e7539d32cd463c86540e00607e274b
-
SHA1
537b182c080ddd6fa8e89b31d67297abf7aef554
-
SHA256
828b9961731797b0a487f095d9980d3771599eb54feab35d1e856b925558e61a
-
SHA512
33c8ff00732e04a360c57aef401467f54a649563c5820c81c19b5de1607102bd9c29c65ca4f8c914885a0031b0c415339efa01122fbda58e17d8ff632d48b567
-
SSDEEP
49152:M55We0VQ+028J5gyUjjp5bCt7S275L6MP/J2H76gYSt98H9Y08ChNB/n:M55We0VCN6jjp5bC5Ft6MX4H76XStCdz
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-