General
-
Target
SeronTest.exe
-
Size
3.1MB
-
Sample
241228-mn7h6axrdm
-
MD5
48acd4292ff6945cfc14c1c9fd9a764e
-
SHA1
5e4c15dfd00432fcb731ac0fa4190cda1d314e0e
-
SHA256
c75b5b56db4572b061ba8a096e58e43a9cd4d47203ceb2152ae03646a7cb8694
-
SHA512
e3a6b1c58dcf80d40f25dc434b9260ef1e35e904b1592e8b21dcad34cb8ffe8362b6243c89b78721f2d8c17e0e69cebd2272d47e2fcb05ffaa0aa5b00516f845
-
SSDEEP
98304:J7NGe5a2R/OYslkwkzycLcAI6jfdZhETdC:JNTg2RtsllkecYANjffhETg
Static task
static1
Behavioral task
behavioral1
Sample
SeronTest.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.1
Seron
nigeboc465-58875.portmap.host:58875
eb8602ec-8a0d-4322-b9a0-544571be5a2d
-
encryption_key
8BD9150EEC3DA71ED82080D7AEB7C165A58C889F
-
install_name
f8mk7ZGwVUpulm.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
f8mk7ZGwVUpulm
-
subdirectory
SubDir
Targets
-
-
Target
SeronTest.exe
-
Size
3.1MB
-
MD5
48acd4292ff6945cfc14c1c9fd9a764e
-
SHA1
5e4c15dfd00432fcb731ac0fa4190cda1d314e0e
-
SHA256
c75b5b56db4572b061ba8a096e58e43a9cd4d47203ceb2152ae03646a7cb8694
-
SHA512
e3a6b1c58dcf80d40f25dc434b9260ef1e35e904b1592e8b21dcad34cb8ffe8362b6243c89b78721f2d8c17e0e69cebd2272d47e2fcb05ffaa0aa5b00516f845
-
SSDEEP
98304:J7NGe5a2R/OYslkwkzycLcAI6jfdZhETdC:JNTg2RtsllkecYANjffhETg
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-