General

  • Target

    ROBLOX-BRUTEFORCER.zip

  • Size

    1.2MB

  • MD5

    7d982f8ff3d5d9204bff6e1c06fb43ba

  • SHA1

    1fe67946a987b42656d2539b3e0713f8af9d104c

  • SHA256

    1746918b750ab5830795a6b7f3b60c60958386cde1c604b069166bff7f5e24c4

  • SHA512

    a939b0760b8151446930140bc0ad041dbe207834014a1a299fe7368f08a99bd642307470d1e2953e142826658b6575e6bd74a430ac86f1898c824ae46b901e18

  • SSDEEP

    24576:6ZW/rbUQrtD/Wr2+eT4VvTePAphOBE3uySZLQSBf3bnEaxANz9w+wyVKA:063UStDebTeYpKSfMvV5+wyVKA

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

rando #1

C2

Gavin:4782

Mutex

6af5f867-8c22-4c1b-9e55-26206f157386

Attributes
  • encryption_key

    196CC5EA294AEC40979442F82371DD57AADC275C

  • install_name

    Roblox-Bruteforcer.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ROBLOX-BRUTEFORCER.zip
    .zip

    Password: lala

  • ROBLOX-BRUTEFORCER/READ-ME.txt
  • ROBLOX-BRUTEFORCER/roblox-bruteforcer.exe
    .exe windows x86

    Password: lala

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections