General
-
Target
FortniteCleaner and Spoofer.bat
-
Size
11.7MB
-
Sample
241230-k4gxbstqbm
-
MD5
2633869ac4a9cb98b01488ac2cb20d72
-
SHA1
167871fab0a19acaf7ad22144d8fdb5b09959a28
-
SHA256
6a52f0cf77b3706de713eff3d7e038ff13d5ca7c8fc837f4eee0adac079cf522
-
SHA512
f4d48d8e672d828c79b65b886c1ca3a423701cd6a8077c0ab78c4d2e60284ed505fc971975beab3e79bd9b9c20f821b52111258642c8bbb4024891a343004543
-
SSDEEP
49152:z+8TuE0MoXJ8qRdxr47sbd6rBJYqfpbAgpK64KspQPEf+UWONvGFni6xha3DrNG0:k
Static task
static1
Behavioral task
behavioral1
Sample
FortniteCleaner and Spoofer.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FortniteCleaner and Spoofer.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
quasar
1.0.0.0
v3.0.6 | Zuni
infallible-water-17742.pktriot.net:22270
35d8168c-a187-4a7a-91c1-0c08c720bf29
-
encryption_key
8D3F0F423E546AEF9412DC2001F9C1DAB11CB7F5
-
install_name
.exe
-
log_directory
$sxr-Logs
-
reconnect_delay
3000
Targets
-
-
Target
FortniteCleaner and Spoofer.bat
-
Size
11.7MB
-
MD5
2633869ac4a9cb98b01488ac2cb20d72
-
SHA1
167871fab0a19acaf7ad22144d8fdb5b09959a28
-
SHA256
6a52f0cf77b3706de713eff3d7e038ff13d5ca7c8fc837f4eee0adac079cf522
-
SHA512
f4d48d8e672d828c79b65b886c1ca3a423701cd6a8077c0ab78c4d2e60284ed505fc971975beab3e79bd9b9c20f821b52111258642c8bbb4024891a343004543
-
SSDEEP
49152:z+8TuE0MoXJ8qRdxr47sbd6rBJYqfpbAgpK64KspQPEf+UWONvGFni6xha3DrNG0:k
-
Quasar family
-
Quasar payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Hide Artifacts: Hidden Window
Windows that would typically be displayed when an application carries out an operation can be hidden.
-
Drops file in System32 directory
-