General
-
Target
robloxlist.exe
-
Size
348KB
-
Sample
250104-bmrwjatkat
-
MD5
cc0ce734de3f88924449b16df0c92911
-
SHA1
af48aa8c33b0d8f0757f9abe8938aa66dfa9a588
-
SHA256
da59a47ae6bde91de01f45a7c3ba4217bd91b4cb0087d58ed4e10eea50866e49
-
SHA512
c92a607b979a3013426ef181daced2792b451180d196078342dd64dcc6496cc98c824a67b60a7073f527ac905e12d62d61651b576e26a1921e60869c85bcd6b0
-
SSDEEP
6144:8uwb/c2L0t5kiOW9ubBcz7b3Ga66b2SO:7H2L5ly6czv3GalbJO
Behavioral task
behavioral1
Sample
robloxlist.exe
Resource
win7-20240708-en
Malware Config
Extracted
quasar
1.3.0.0
Clint
192.168.178.29:4780
192.168.178.29:4782
QSR_MUTEX_02VEKG7zCDubNpN0wF
-
encryption_key
SPXni05TVd0oAIJtmwYk
-
install_name
robloxfisch.exe
-
log_directory
Log
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
robloxlist.exe
-
Size
348KB
-
MD5
cc0ce734de3f88924449b16df0c92911
-
SHA1
af48aa8c33b0d8f0757f9abe8938aa66dfa9a588
-
SHA256
da59a47ae6bde91de01f45a7c3ba4217bd91b4cb0087d58ed4e10eea50866e49
-
SHA512
c92a607b979a3013426ef181daced2792b451180d196078342dd64dcc6496cc98c824a67b60a7073f527ac905e12d62d61651b576e26a1921e60869c85bcd6b0
-
SSDEEP
6144:8uwb/c2L0t5kiOW9ubBcz7b3Ga66b2SO:7H2L5ly6czv3GalbJO
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-