General
-
Target
payload_1_sxr.exe
-
Size
10.3MB
-
Sample
250204-zzp5gasmgt
-
MD5
a0986241fcfed849a9d1dce2466840de
-
SHA1
6e47f0378ab7c921b3c04d29aae5de1415d1aaf8
-
SHA256
ac562299cd216585d58cab4c435c1578f3e451820a4c0feb2d902d0662645446
-
SHA512
8e192128a7be9b6b0857a3eca1a479ed28eaae2943ae1803fdd4b523c57e106f089c6b04cfe318a757171a3e52a603d91d395f94adbf9d5d5f300b3d91311ca4
-
SSDEEP
49152:sKxzaVKJayp/GrDlGcfk/5ZRuUtNUDrTRaDqeF5gLRyoKq6XBkim7fEM27cIgpvW:sKxzcK
Static task
static1
Behavioral task
behavioral1
Sample
payload_1_sxr.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
payload_1_sxr.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
quasar
1.0.0.0
v2.2.2 | NuGeta
igboat.com:1167
6a5dd02b-c4c3-4c95-8718-d851c4c1b042
-
encryption_key
9DE783214A7E1A7FD46C38C81B5C15C4E297596E
-
install_name
.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
Targets
-
-
Target
payload_1_sxr.exe
-
Size
10.3MB
-
MD5
a0986241fcfed849a9d1dce2466840de
-
SHA1
6e47f0378ab7c921b3c04d29aae5de1415d1aaf8
-
SHA256
ac562299cd216585d58cab4c435c1578f3e451820a4c0feb2d902d0662645446
-
SHA512
8e192128a7be9b6b0857a3eca1a479ed28eaae2943ae1803fdd4b523c57e106f089c6b04cfe318a757171a3e52a603d91d395f94adbf9d5d5f300b3d91311ca4
-
SSDEEP
49152:sKxzaVKJayp/GrDlGcfk/5ZRuUtNUDrTRaDqeF5gLRyoKq6XBkim7fEM27cIgpvW:sKxzcK
-
Quasar family
-
Quasar payload
-
Seroxen family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-