General
-
Target
VaporWave2-1.exe
-
Size
72.5MB
-
Sample
241107-gg2rfaxcml
-
MD5
af85b5d9c237ea75d4a307d5157c847f
-
SHA1
84ad14e5d89bd85f0ef1bb5f3269c0d6929c6a53
-
SHA256
3e7fe3f421b50a884cc30ac892a739e895f4243ed554183deebc7415593ee2d2
-
SHA512
bf2e7414f1e00d69aaf3dab61a938c3051f429b712d8dcccd3f7a7a32226d42dc66477c1fac7cbb67a326dd05b33de7afbc176ce4280405ac69e2e8dcbdabca3
-
SSDEEP
6144:UI6bPXhLApfpo8CL1g1N1ZflpUwGbeCqgHcFi9vNnoGjlhjl7k4:lmhAp5CL1g1N1ZfXxpi9vhHl1l7k4
Behavioral task
behavioral1
Sample
VaporWave2-1.exe
Resource
win7-20240903-en
Malware Config
Extracted
quasar
1.3.0.0
general1
servicehos.zapto.org:4444
QSR_MUTEX_ksxWAP4ziOqMlreofU
-
encryption_key
i9HUVkY4QNExDOHIMtIX
-
install_name
svchost.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
svchost
-
subdirectory
SubDir
Targets
-
-
Target
VaporWave2-1.exe
-
Size
72.5MB
-
MD5
af85b5d9c237ea75d4a307d5157c847f
-
SHA1
84ad14e5d89bd85f0ef1bb5f3269c0d6929c6a53
-
SHA256
3e7fe3f421b50a884cc30ac892a739e895f4243ed554183deebc7415593ee2d2
-
SHA512
bf2e7414f1e00d69aaf3dab61a938c3051f429b712d8dcccd3f7a7a32226d42dc66477c1fac7cbb67a326dd05b33de7afbc176ce4280405ac69e2e8dcbdabca3
-
SSDEEP
6144:UI6bPXhLApfpo8CL1g1N1ZflpUwGbeCqgHcFi9vNnoGjlhjl7k4:lmhAp5CL1g1N1ZfXxpi9vhHl1l7k4
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-