General
-
Target
Bloxstrap.exe
-
Size
7.6MB
-
Sample
240527-lw62xsff8y
-
MD5
dbb820772caf0003967ef0f269fbdeb1
-
SHA1
31992bd4977a7dfeba67537a2da6c9ca64bc304c
-
SHA256
b2ac1e407ed3ecd7c7faa6de929a68fb51145662cf793c40b69eb59295bba6bc
-
SHA512
e8ac879c7198dffb78bc6ee4ad49b5de40a5a7dbbda53d427d0a034941487d13c8bb2b8d590a1fcdd81cd6abb8f21fdfcd52924eb00c45a42ee06c1e4b3d590f
-
SSDEEP
98304:XNd5DSd5DxTsed5D2ZT00UuOYoHwfLk3vSmaR0+Mc4AN0edaAHDfysrTl1:X+sdtObAbN0u
Static task
static1
Behavioral task
behavioral1
Sample
Bloxstrap.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
Bloxstrap.exe
Resource
win11-20240419-en
Malware Config
Extracted
quasar
1.4.1
Office04
10.127.0.97:9090
3fb73ee1-4fa6-45cb-94cb-7668845a3358
-
encryption_key
694F4A28289046081419A7765A6B471BB8E19CE7
-
install_name
rozz.exe
-
log_directory
Logs
-
reconnect_delay
1
-
startup_key
rozzlacurt
-
subdirectory
nig
Targets
-
-
Target
Bloxstrap.exe
-
Size
7.6MB
-
MD5
dbb820772caf0003967ef0f269fbdeb1
-
SHA1
31992bd4977a7dfeba67537a2da6c9ca64bc304c
-
SHA256
b2ac1e407ed3ecd7c7faa6de929a68fb51145662cf793c40b69eb59295bba6bc
-
SHA512
e8ac879c7198dffb78bc6ee4ad49b5de40a5a7dbbda53d427d0a034941487d13c8bb2b8d590a1fcdd81cd6abb8f21fdfcd52924eb00c45a42ee06c1e4b3d590f
-
SSDEEP
98304:XNd5DSd5DxTsed5D2ZT00UuOYoHwfLk3vSmaR0+Mc4AN0edaAHDfysrTl1:X+sdtObAbN0u
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-