General
-
Target
BloxStrap v2.5.4.1.exe
-
Size
3.1MB
-
Sample
240510-qfhfvabe87
-
MD5
4fe3f16488126ea4b072fc6fcfc910b0
-
SHA1
ba0b203f96f771e61d952ab925b773ac475a141b
-
SHA256
52f9d1a2c3d4518da21b3426a0ccefb04e07316755f97de9eaaecc1e09c4b5c7
-
SHA512
782a429364de283c8bda39c6f0ffc07847fe3d580a4f0280a9ccd75aeb6420280fe1d0b1a6e61cbd176d8f6fd331b50780c7f8239bff81b6eaf55ae647477697
-
SSDEEP
49152:uvEt62XlaSFNWPjljiFa2RoUYIjyDHTmzopoGdSweTHHB72eh2NT:uvY62XlaSFNWPjljiFXRoUYIjyDHh
Behavioral task
behavioral1
Sample
BloxStrap v2.5.4.1.exe
Resource
win7-20240221-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.114:4782
10d94abb-0198-407e-aa98-bb80c5b37835
-
encryption_key
45C885494447187E9FBAD6C4E1ACD4A1590FC706
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Runtime
-
subdirectory
SubDir
Targets
-
-
Target
BloxStrap v2.5.4.1.exe
-
Size
3.1MB
-
MD5
4fe3f16488126ea4b072fc6fcfc910b0
-
SHA1
ba0b203f96f771e61d952ab925b773ac475a141b
-
SHA256
52f9d1a2c3d4518da21b3426a0ccefb04e07316755f97de9eaaecc1e09c4b5c7
-
SHA512
782a429364de283c8bda39c6f0ffc07847fe3d580a4f0280a9ccd75aeb6420280fe1d0b1a6e61cbd176d8f6fd331b50780c7f8239bff81b6eaf55ae647477697
-
SSDEEP
49152:uvEt62XlaSFNWPjljiFa2RoUYIjyDHTmzopoGdSweTHHB72eh2NT:uvY62XlaSFNWPjljiFXRoUYIjyDHh
-
Quasar payload
-
Executes dropped EXE
-
Drops file in System32 directory
-