General
-
Target
ZinxE.exe
-
Size
3.1MB
-
Sample
250128-nwp5hszrej
-
MD5
0140172177cb3a07b943bd6402bfc3ed
-
SHA1
e0a84cdf6e95bd35e4a6decb2bd92a9b4e3b1906
-
SHA256
0f792f8eb7bfac109028240f2dad7294be0d110f70d74c62c46850362921203f
-
SHA512
9fceb15de82994bcc54cc4a907b572e4f87666c33f4b9bdad18056cb6c44b0aad8bc19d8b3ef6d239a51097d5e460fbac41d8a7232872f836986735894a625d4
-
SSDEEP
49152:2v2I22SsaNYfdPBldt698dBcjHJSv/lBxBjoGd3EtTHHB72eh2NT:2vb22SsaNYfdPBldt6+dBcjHY/vHE
Malware Config
Extracted
quasar
1.4.1
thee
192.168.0.108:4782
125.25.56.200:4782
e019a276-a66a-4019-9492-a07a85347b7f
-
encryption_key
242D976031AFD7480A21D8DDA2E114B47EB747FB
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
csystem
-
subdirectory
SubDir
Targets
-
-
Target
ZinxE.exe
-
Size
3.1MB
-
MD5
0140172177cb3a07b943bd6402bfc3ed
-
SHA1
e0a84cdf6e95bd35e4a6decb2bd92a9b4e3b1906
-
SHA256
0f792f8eb7bfac109028240f2dad7294be0d110f70d74c62c46850362921203f
-
SHA512
9fceb15de82994bcc54cc4a907b572e4f87666c33f4b9bdad18056cb6c44b0aad8bc19d8b3ef6d239a51097d5e460fbac41d8a7232872f836986735894a625d4
-
SSDEEP
49152:2v2I22SsaNYfdPBldt698dBcjHJSv/lBxBjoGd3EtTHHB72eh2NT:2vb22SsaNYfdPBldt6+dBcjHY/vHE
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-