General
-
Target
BloxScripts.exe
-
Size
12.8MB
-
Sample
250211-wegqtavkar
-
MD5
1705aca93e5b467a60a3558345306428
-
SHA1
7f6e72e63a22edd278c81e7a6b760856636259b7
-
SHA256
aeefbc3356c7f36db8a4d7f12ef63c8d6ff4c8bed178ec31cf6cab49f8b03d50
-
SHA512
11f1718d570aba665b8bba37a0133c3916d0a55213e70f3729bf2c51f84b70a73fa7ea77d659de546dd60995509ba35d9671099e7b30397c1f232c36ff91da97
-
SSDEEP
393216:vfChwrd42aSS4PDzy1Nt/3ANKBu0MCfD14o:3Iwx4KDDz0a3dCf2o
Static task
static1
Behavioral task
behavioral1
Sample
BloxScripts.exe
Resource
win7-20241010-en
Malware Config
Extracted
quasar
1.4.1
Office04
192.168.1.191:4782
ce9247ec-b417-4093-b0d1-2caaee0d1141
-
encryption_key
C2C5B6669CD8FD67ABE180D329CF60300D8F95A2
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
BloxScripts.exe
-
Size
12.8MB
-
MD5
1705aca93e5b467a60a3558345306428
-
SHA1
7f6e72e63a22edd278c81e7a6b760856636259b7
-
SHA256
aeefbc3356c7f36db8a4d7f12ef63c8d6ff4c8bed178ec31cf6cab49f8b03d50
-
SHA512
11f1718d570aba665b8bba37a0133c3916d0a55213e70f3729bf2c51f84b70a73fa7ea77d659de546dd60995509ba35d9671099e7b30397c1f232c36ff91da97
-
SSDEEP
393216:vfChwrd42aSS4PDzy1Nt/3ANKBu0MCfD14o:3Iwx4KDDz0a3dCf2o
-
Quasar family
-
Quasar payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-