General
-
Target
HackingTool2-pre-build.exe
-
Size
349KB
-
Sample
250124-x4rsratqcs
-
MD5
79784bc17a6b8cc3d54c0960d439dd95
-
SHA1
b7a516a2f1a672332d30f2cf901abd2699530917
-
SHA256
fe49e1e39c332cbaae858c46aa639fd8330d0fc5b3c0ee08699d251ff2765051
-
SHA512
4ba3238087114ee53ccaec30c6b54b01021d5c456f5e21b695ae4dada43a42d2e911288fbabd49ddcde7420a2cbf5110d8ddc988af716f087c726652ab262e91
-
SSDEEP
3072:aKK2J10sQyMaFSlEcEj69HGRMCGE0Nm1kXcjKPhk1EXQ/vWfbryU5rFuDXMeVGdc:rK2J10qdSlEc39HGlUZKl/Ofbm24V0I
Behavioral task
behavioral1
Sample
HackingTool2-pre-build.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.3.0.0
Niñorata
84.247.189.255:4782
QSR_MUTEX_FmGPPoFy6YzWX6Vhge
-
encryption_key
ZwtLwao8GASaVTgFbvuh
-
install_name
nvidia-subprocess-gamepanel.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
nvidia-subprocess
-
subdirectory
SubDir
Targets
-
-
Target
HackingTool2-pre-build.exe
-
Size
349KB
-
MD5
79784bc17a6b8cc3d54c0960d439dd95
-
SHA1
b7a516a2f1a672332d30f2cf901abd2699530917
-
SHA256
fe49e1e39c332cbaae858c46aa639fd8330d0fc5b3c0ee08699d251ff2765051
-
SHA512
4ba3238087114ee53ccaec30c6b54b01021d5c456f5e21b695ae4dada43a42d2e911288fbabd49ddcde7420a2cbf5110d8ddc988af716f087c726652ab262e91
-
SSDEEP
3072:aKK2J10sQyMaFSlEcEj69HGRMCGE0Nm1kXcjKPhk1EXQ/vWfbryU5rFuDXMeVGdc:rK2J10qdSlEc39HGlUZKl/Ofbm24V0I
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-