General
-
Target
extracted_payload-cleaned - Copy.exe
-
Size
5.8MB
-
Sample
250204-28xa9axlhx
-
MD5
bcff5526d0e5da9524a89b2dcc809cee
-
SHA1
b8c321683058f79eb810e73d338caf292fc04611
-
SHA256
a0161d709793136e815c902d928421ca5447ac394449a35ee529d85aed318251
-
SHA512
a9101d4991c49c229b324e5313a9f92cdb489fa1aab68970cdf8189029ad4f30aa03a97c2441be800eec9995042656bc180d00632e8400f43b0c57c023185a53
-
SSDEEP
98304:dVzA+NolR3oceUQ1spbvuKSUJ17LrbH4q8y1iYVk1OUkh54oZdxkOHYSM:7PNO3K1spbmxcrbH4a1iYVk1O15DUC
Static task
static1
Behavioral task
behavioral1
Sample
extracted_payload-cleaned - Copy.exe
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral2
Sample
extracted_payload-cleaned - Copy.exe
Resource
win11-20241007-en
Malware Config
Extracted
quasar
1.4.0
v15.0 | Fifa23
private123.duckdns.org:8808
dofucks.com:8808
c398e98c-136e-4007-ab40-e179829f338c
-
encryption_key
C84CB6134701741C5122A14FACDB67C8CFA9C0AB
-
install_name
.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
$sxr-seroxen
Targets
-
-
Target
extracted_payload-cleaned - Copy.exe
-
Size
5.8MB
-
MD5
bcff5526d0e5da9524a89b2dcc809cee
-
SHA1
b8c321683058f79eb810e73d338caf292fc04611
-
SHA256
a0161d709793136e815c902d928421ca5447ac394449a35ee529d85aed318251
-
SHA512
a9101d4991c49c229b324e5313a9f92cdb489fa1aab68970cdf8189029ad4f30aa03a97c2441be800eec9995042656bc180d00632e8400f43b0c57c023185a53
-
SSDEEP
98304:dVzA+NolR3oceUQ1spbvuKSUJ17LrbH4q8y1iYVk1OUkh54oZdxkOHYSM:7PNO3K1spbmxcrbH4a1iYVk1O15DUC
-
Quasar family
-
Quasar payload
-
Seroxen family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Suspicious use of SetThreadContext
-