General
-
Target
2025-04-20_59ddcad28d941a4cd3af90a10a3833a7_elex_mafia
-
Size
5.1MB
-
Sample
250420-q2w65aw1ez
-
MD5
59ddcad28d941a4cd3af90a10a3833a7
-
SHA1
a831be3525978ff33076479ad43935fc23432927
-
SHA256
7c53e91f6e48aa2c0dec8a5ddd6e29c551aeb27b8a4da027036b0436b2e1a581
-
SHA512
0b630da6233302d6912cb36b34eba465329f6087afdd9be7ce2e232ad6910f86c90db29983c7e391232106012bb583e115e7c988ae3f326a5d85eb0187fcde63
-
SSDEEP
98304:4EavUEH9tOXMHer9STJsv6tWKFdu9CLDsEJncODv6k3QaW:zGtDXTJsv6tWKFdu9CLBJnP6k3Q
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-20_59ddcad28d941a4cd3af90a10a3833a7_elex_mafia.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
2025-04-20_59ddcad28d941a4cd3af90a10a3833a7_elex_mafia.exe
Resource
win11-20250410-en
Malware Config
Extracted
quasar
�YO,������-�zۜg��������q
-
encryption_key
B79C633924DB50C64E5A0FDA379FDD053E7E4574
-
log_directory
���ʻ�]�3�탃
-
reconnect_delay
3000
Targets
-
-
Target
2025-04-20_59ddcad28d941a4cd3af90a10a3833a7_elex_mafia
-
Size
5.1MB
-
MD5
59ddcad28d941a4cd3af90a10a3833a7
-
SHA1
a831be3525978ff33076479ad43935fc23432927
-
SHA256
7c53e91f6e48aa2c0dec8a5ddd6e29c551aeb27b8a4da027036b0436b2e1a581
-
SHA512
0b630da6233302d6912cb36b34eba465329f6087afdd9be7ce2e232ad6910f86c90db29983c7e391232106012bb583e115e7c988ae3f326a5d85eb0187fcde63
-
SSDEEP
98304:4EavUEH9tOXMHer9STJsv6tWKFdu9CLDsEJncODv6k3QaW:zGtDXTJsv6tWKFdu9CLBJnP6k3Q
Score10/10-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Adds Run key to start application
-