General
-
Target
Fornite.exe
-
Size
3.1MB
-
Sample
241209-xhp22axlbx
-
MD5
48aec1dda8d4ae1306c724aedbe46b34
-
SHA1
630be12af505a34d8364f1f877f2e7a5eb9e3fb5
-
SHA256
dce91f89aa58769be83590d95ca759496b9526504f93341707f49d304aeafd1a
-
SHA512
4308b6186231d97c1b7f21ed48c7c21a4b21f6d01762e304c7d459651767b48ae408e19dec72be03e860ebaeee8b046ab43c437d404fbe4751865f9891cbafd7
-
SSDEEP
49152:uv7I22SsaNYfdPBldt698dBcjHTIbde8Mf6soGd/KTHHB72eh2NT:uvE22SsaNYfdPBldt6+dBcjHTIbdexv
Behavioral task
behavioral1
Sample
Fornite.exe
Resource
win7-20240708-en
Malware Config
Extracted
quasar
1.4.1
gang
tree773838873fsddsfsd-45286.portmap.host:45286
6db1cf6e-3d82-43ce-a6bc-f6707b3cb43c
-
encryption_key
623F2B26E2573C612C775F98AA4DD0644A76715E
-
install_name
Spoofer.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SYSTEM
-
subdirectory
test
Targets
-
-
Target
Fornite.exe
-
Size
3.1MB
-
MD5
48aec1dda8d4ae1306c724aedbe46b34
-
SHA1
630be12af505a34d8364f1f877f2e7a5eb9e3fb5
-
SHA256
dce91f89aa58769be83590d95ca759496b9526504f93341707f49d304aeafd1a
-
SHA512
4308b6186231d97c1b7f21ed48c7c21a4b21f6d01762e304c7d459651767b48ae408e19dec72be03e860ebaeee8b046ab43c437d404fbe4751865f9891cbafd7
-
SSDEEP
49152:uv7I22SsaNYfdPBldt698dBcjHTIbde8Mf6soGd/KTHHB72eh2NT:uvE22SsaNYfdPBldt6+dBcjHTIbdexv
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-