General
-
Target
Free Robux.exe
-
Size
3.1MB
-
Sample
230803-tk67jsfd6y
-
MD5
12dfc98e55d187e82fe2207383447e0b
-
SHA1
efb3fb106202b9a12f1894e703fcee27cb93e28c
-
SHA256
78980e753b2dc821107c2e8f10df4ff86ca9fde82f7c97b1949c2315ba955f9f
-
SHA512
410097f00d1bf81b5ab27cc02993b78d9f8ea44d1ff2bee44d322211e282f398fe3d623d295567b67292433720515f29ec6ce1438874e49d09ac266afdfad8b9
-
SSDEEP
49152:DvBuf2NUaNmwzPWlvdaKM7ZxTwdlRJ64bR3LoGdQTHHB72eh2NT:Dvcf2NUaNmwzPWlvdaB7ZxTwdlRJ6S
Behavioral task
behavioral1
Sample
Free Robux.exe
Resource
win7-20230712-en
Malware Config
Extracted
quasar
1.4.1
Infected
192.168.1.1:4782
192.168.1.66:4782
dark-crystal.at.ply.gg:4782
ff410ede-beff-4970-8e12-7d251057f1fd
-
encryption_key
1B172706DED462B59F2A5056AB06A8DD1EE8491B
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Realtek Audio
-
subdirectory
SubDir
Targets
-
-
Target
Free Robux.exe
-
Size
3.1MB
-
MD5
12dfc98e55d187e82fe2207383447e0b
-
SHA1
efb3fb106202b9a12f1894e703fcee27cb93e28c
-
SHA256
78980e753b2dc821107c2e8f10df4ff86ca9fde82f7c97b1949c2315ba955f9f
-
SHA512
410097f00d1bf81b5ab27cc02993b78d9f8ea44d1ff2bee44d322211e282f398fe3d623d295567b67292433720515f29ec6ce1438874e49d09ac266afdfad8b9
-
SSDEEP
49152:DvBuf2NUaNmwzPWlvdaKM7ZxTwdlRJ64bR3LoGdQTHHB72eh2NT:Dvcf2NUaNmwzPWlvdaB7ZxTwdlRJ6S
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-