General
-
Target
https://hackerone.com/roblox/thanks
-
Sample
241030-thqrsavrgv
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://hackerone.com/roblox/thanks
Resource
win10v2004-20241007-en
windows10-2004-x64
21 signatures
150 seconds
Malware Config
Extracted
Family
quasar
Version
1.4.1
Botnet
Office04
C2
10.127.0.190:4782
Mutex
73bb01eb-13f9-4b6f-9445-c8d0481bd51d
Attributes
-
encryption_key
62E69DA8A3E1C409D9E4DDB6C6C194AA06AD6112
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
https://hackerone.com/roblox/thanks
-
Quasar family
-
Quasar payload
-
Legitimate hosting services abused for malware hosting/C2
-