General
-
Target
dump.exe
-
Size
5.8MB
-
Sample
250213-2da5jawndm
-
MD5
10c2b6a21c47a6b567b5ea3c0bfb40df
-
SHA1
c41a11aaaab6da88b5f31ce0a8b05d2d8fe6d7f7
-
SHA256
8599ef74efe41dd289680cd68671eb83841e3211f5af29c37319625717aaa39d
-
SHA512
ea57119d520b6483e91504a7ba841a7ce0f3432e43909db529efaca0cd8ba4b3a6e11fc2bd443a0266d8ba70ee7f0d2dfc4743e2043f084f4a3248f37e019a07
-
SSDEEP
98304:KiSU0Om2cae1pjuzggn+78Rvjxf1npRNX3/hb//eRrklpXzlTDk7NMOFW+uD5mV/:1cae6i8RjLpRNn/hDUrsDZDqNMO4Dc84
Static task
static1
Behavioral task
behavioral1
Sample
dump.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.4.0
v15.0 | apes
x0p-28935.portmap.host:28935
ebcea023-0c6f-4b5a-bee5-b1303518917d
-
encryption_key
2D54CC26681E4B8F78F80945A537E0CA6221A405
-
install_name
.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
$sxr-seroxen
Targets
-
-
Target
dump.exe
-
Size
5.8MB
-
MD5
10c2b6a21c47a6b567b5ea3c0bfb40df
-
SHA1
c41a11aaaab6da88b5f31ce0a8b05d2d8fe6d7f7
-
SHA256
8599ef74efe41dd289680cd68671eb83841e3211f5af29c37319625717aaa39d
-
SHA512
ea57119d520b6483e91504a7ba841a7ce0f3432e43909db529efaca0cd8ba4b3a6e11fc2bd443a0266d8ba70ee7f0d2dfc4743e2043f084f4a3248f37e019a07
-
SSDEEP
98304:KiSU0Om2cae1pjuzggn+78Rvjxf1npRNX3/hb//eRrklpXzlTDk7NMOFW+uD5mV/:1cae6i8RjLpRNn/hDUrsDZDqNMO4Dc84
-
Quasar family
-
Quasar payload
-
Seroxen family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Suspicious use of SetThreadContext
-