General

  • Target

    fortnite spoofer.exe

  • Size

    3.1MB

  • MD5

    61e9dd7cbb5174695923be9ba386866e

  • SHA1

    f0bb5f878120d2e428270dfab15cb79e91bc1efa

  • SHA256

    be7f171061697229768b4991d5cf177dfa71b7cc963fbea7f75c0bf7294f02fc

  • SHA512

    354e665b449de2c9cbd942f129d34279307c6c521786d3f24b0c2ae094863ffb3867464563c227f659fcd64defa19bcb31d6aff41b7973c8fc0cf636af98b034

  • SSDEEP

    98304:bvdL26AaNeWgPhlmVqkQ7XSKCVgk03Mf:Tr4SF43M

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

fortnite spoofer

C2

100.80.114.4:4782

Mutex

beb3403b-9dc9-495c-b3c3-cc45b6c99a9f

Attributes
  • encryption_key

    BB72AF51530CE07B54E1C1F697306241CE9CED4C

  • install_name

    fortnite spoofer.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Update

  • subdirectory

    so good

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • fortnite spoofer.exe
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections