General
-
Target
Client-built.exe
-
Size
502KB
-
Sample
241115-atcvhswbqp
-
MD5
4b84ba6fb64643df80a50b4351368a7c
-
SHA1
0c45bb4d28399f09e5a92c341f544e7141e371e0
-
SHA256
c976e871fc4a85df9b709fde9715ac426fb6796e1a4e097230799a1381f9247c
-
SHA512
6b1207eb35f55b903f59f966ebda8e1a0dfbd552a24a9d999bdfe520f1d40a48ba74574274d1ab526708708635a20f0babadc2f1c9006772be4e947d1703f197
-
SSDEEP
6144:VTEgdc0YmX7IxUpGREW7dBdTED8KdDkQfocEBOb8F9r8Hc1ecTR32:VTEgdfYnxUJJDkRpBPecd2
Malware Config
Extracted
quasar
1.4.0
Office04
147.185.221.19:6401
0623266f-d360-4056-9f63-ed81b7a11fdf
-
encryption_key
CAC47E124130EBD3A11EBA5B8DAA79439482A0B5
-
install_name
Roblox.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
123
-
subdirectory
Roblox
Targets
-
-
Target
Client-built.exe
-
Size
502KB
-
MD5
4b84ba6fb64643df80a50b4351368a7c
-
SHA1
0c45bb4d28399f09e5a92c341f544e7141e371e0
-
SHA256
c976e871fc4a85df9b709fde9715ac426fb6796e1a4e097230799a1381f9247c
-
SHA512
6b1207eb35f55b903f59f966ebda8e1a0dfbd552a24a9d999bdfe520f1d40a48ba74574274d1ab526708708635a20f0babadc2f1c9006772be4e947d1703f197
-
SSDEEP
6144:VTEgdc0YmX7IxUpGREW7dBdTED8KdDkQfocEBOb8F9r8Hc1ecTR32:VTEgdfYnxUJJDkRpBPecd2
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-