General

  • Target

    RBXStealer.exe

  • Size

    3.1MB

  • MD5

    ea643dce6a236e1026be63d7f2211c4d

  • SHA1

    ad1742bae232519509a0167335c1bf5c88535e9f

  • SHA256

    6e62ead086c4688af78a8b0f8f612ceb4cbeb0f3302d2744fa917661d6c94614

  • SHA512

    d0bf3cae944bf909833afc700c64d15120384e714eaf850022d65e0d8ae34f0846dafbc27dbdff3debbcd66db2b1f720ed612c0a1d97fccc343abdc726835b78

  • SSDEEP

    49152:9vkt62XlaSFNWPjljiFa2RoUYI1Fq5p3mC15oGd8THHB72eh2NT:9v462XlaSFNWPjljiFXRoUYI3q5pH

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

XBOSS

C2

192.168.2.91:4782

Mutex

7cbab0f6-7ba5-44c0-8957-bfb1d9e994ed

Attributes
  • encryption_key

    31FE4207E60C676A8B9E565FA5BDAB999C03B1BB

  • install_name

    RBXStealer.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    RBXStealer

  • subdirectory

    SubDir

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • RBXStealer.exe
    .exe windows:4 windows x86 arch:x86

    Password: infected

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections