General
-
Target
VEGAS_Pro_20.0.0.exe
-
Size
677.8MB
-
Sample
241109-ytw56a1drl
-
MD5
3548345d694b258ecdacfb30bf01ef32
-
SHA1
cf958f11cd7b52f0395d9cbfc0c7c43b01d55ba8
-
SHA256
cae8174d33366208ec89a8a16b349f7a78409b7f6421b24c25a1711f222f180b
-
SHA512
bb2b5c4ef4cdc76a182506dcd44fe1f0d8b5ef81261a1463e1c835a37f6c10e2d9d6daf3381df53649fe0a66aed80aeeebb242a244a094603f168a946272f597
-
SSDEEP
12582912:VpwoWBS+gchR75aVsLbNWMXOpWe2ejvclvdm7Btj9En2nfwgCnXT:/c4+gGLaVKV5eVvclInfw7
Static task
static1
Malware Config
Extracted
quasar
1.3.0.0
Vegas
stopman.ooguy.com:1980
craftIP.gize.com:1980
hbDAGXDpWKGDNPO4ZT
-
encryption_key
oWXRR9aQDa0d3E44x2b3
-
install_name
Client.exe
-
log_directory
mincraft
-
reconnect_delay
5000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
VEGAS_Pro_20.0.0.exe
-
Size
677.8MB
-
MD5
3548345d694b258ecdacfb30bf01ef32
-
SHA1
cf958f11cd7b52f0395d9cbfc0c7c43b01d55ba8
-
SHA256
cae8174d33366208ec89a8a16b349f7a78409b7f6421b24c25a1711f222f180b
-
SHA512
bb2b5c4ef4cdc76a182506dcd44fe1f0d8b5ef81261a1463e1c835a37f6c10e2d9d6daf3381df53649fe0a66aed80aeeebb242a244a094603f168a946272f597
-
SSDEEP
12582912:VpwoWBS+gchR75aVsLbNWMXOpWe2ejvclvdm7Btj9En2nfwgCnXT:/c4+gGLaVKV5eVvclInfw7
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-