General
-
Target
robloxfischscriptlist.exe
-
Size
348KB
-
Sample
250104-bq5lsswlaq
-
MD5
548fa12c57a2af723d85d90a4a8a6611
-
SHA1
b149e2c987cf1c584b94bb752bd81b27cde7f83b
-
SHA256
a591429743ce96a0c4b8d7e86130c3a61505cde949e9996b15117f6ab85a2b85
-
SHA512
3dc814d8ea98219444800ddffb6ff885fca45b8e305022156ea1620a09c5667a53d115225e4ef60448121797a4f383891cfd61b8bdc2bad61cc42828d0d7a217
-
SSDEEP
6144:MmNHXf500MbsOnxaxfROEUbDgosLDqvJq9v7IHPnW:Td50iOnvEViJq9TIvnW
Behavioral task
behavioral1
Sample
robloxfischscriptlist.exe
Resource
win7-20240708-en
Malware Config
Extracted
quasar
1.3.0.0
Clint
192.168.178.29:4780
QSR_MUTEX_02VEKG7zCDubNpN0wF
-
encryption_key
Bdex5bWk923mG5O2SXnn
-
install_name
robloxfisch.exe
-
log_directory
Log
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
robloxfischscriptlist.exe
-
Size
348KB
-
MD5
548fa12c57a2af723d85d90a4a8a6611
-
SHA1
b149e2c987cf1c584b94bb752bd81b27cde7f83b
-
SHA256
a591429743ce96a0c4b8d7e86130c3a61505cde949e9996b15117f6ab85a2b85
-
SHA512
3dc814d8ea98219444800ddffb6ff885fca45b8e305022156ea1620a09c5667a53d115225e4ef60448121797a4f383891cfd61b8bdc2bad61cc42828d0d7a217
-
SSDEEP
6144:MmNHXf500MbsOnxaxfROEUbDgosLDqvJq9v7IHPnW:Td50iOnvEViJq9TIvnW
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-