General
-
Target
SeronTest.exe
-
Size
3.1MB
-
Sample
241228-nc2zzayjhp
-
MD5
c18003ca99f5096b2fe9447a5287b5ed
-
SHA1
10ebcb15ed1eb9def39fd6a9dfa4db8ef83e61ca
-
SHA256
ad5cb8a93739cfa25593297273376d7184e735ce1d373988cb179084b8bb6059
-
SHA512
6ebb5def09d76801243c45fbf83844b8d9ad7c27154cc289c88fed630f3b1952af4dea4febdde021cf0c3a9b3fbddaefe89f1fc5903b03e52768f570376f2aac
-
SSDEEP
49152:TvelL26AaNeWgPhlmVqvMQ7XSK3PxNESE+k/iuLoGdUTHHB72eh2NT:TvOL26AaNeWgPhlmVqkQ7XSKfxNQ
Malware Config
Extracted
quasar
1.4.1
Seron
nigeboc465-58875.portmap.host:58875
eb8602ec-8a0d-4322-b9a0-544571be5a2d
-
encryption_key
8BD9150EEC3DA71ED82080D7AEB7C165A58C889F
-
install_name
f8mk7ZGwVUpulm.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
f8mk7ZGwVUpulm
-
subdirectory
SubDir
Targets
-
-
Target
SeronTest.exe
-
Size
3.1MB
-
MD5
c18003ca99f5096b2fe9447a5287b5ed
-
SHA1
10ebcb15ed1eb9def39fd6a9dfa4db8ef83e61ca
-
SHA256
ad5cb8a93739cfa25593297273376d7184e735ce1d373988cb179084b8bb6059
-
SHA512
6ebb5def09d76801243c45fbf83844b8d9ad7c27154cc289c88fed630f3b1952af4dea4febdde021cf0c3a9b3fbddaefe89f1fc5903b03e52768f570376f2aac
-
SSDEEP
49152:TvelL26AaNeWgPhlmVqvMQ7XSK3PxNESE+k/iuLoGdUTHHB72eh2NT:TvOL26AaNeWgPhlmVqkQ7XSKfxNQ
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-