General
-
Target
Velocity.exe
-
Size
3.2MB
-
Sample
250327-przc3atpy8
-
MD5
537055d2d528bfbe39b4ed23f981bc3f
-
SHA1
d1779f003cc53b6b62aad0aa569d159fcfff481e
-
SHA256
e864d7a6f0e27540456778b7f8dd2d0b290cd2566c57912aa6aa224e6af8e90f
-
SHA512
eace66995f8d17d8f3e83f27a9dd0cfda1774c680cb5b1e912d6fbc96b395aa58d048cc06ac1aae3742bf782e863c0255a77e7e8d980b544e85a7031af87f4dd
-
SSDEEP
49152:pvnI22SsaNYfdPBldt698dBcjH7jZUHBeMuoidXTHHB72eh2NTw:pvI22SsaNYfdPBldt6+dBcjH7VUwv
Behavioral task
behavioral1
Sample
Velocity.exe
Resource
win7-20240729-en
Malware Config
Extracted
quasar
1.4.1
Office4
192.168.70.183:4782
1b6fc605-bba5-4ddc-971f-36e190d34bce
-
encryption_key
B87D07BD2442C5166BC5075BBDF32026912B9388
-
install_name
Velocity.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
RobloxPlayerBeta
-
subdirectory
.minecraft
Targets
-
-
Target
Velocity.exe
-
Size
3.2MB
-
MD5
537055d2d528bfbe39b4ed23f981bc3f
-
SHA1
d1779f003cc53b6b62aad0aa569d159fcfff481e
-
SHA256
e864d7a6f0e27540456778b7f8dd2d0b290cd2566c57912aa6aa224e6af8e90f
-
SHA512
eace66995f8d17d8f3e83f27a9dd0cfda1774c680cb5b1e912d6fbc96b395aa58d048cc06ac1aae3742bf782e863c0255a77e7e8d980b544e85a7031af87f4dd
-
SSDEEP
49152:pvnI22SsaNYfdPBldt698dBcjH7jZUHBeMuoidXTHHB72eh2NTw:pvI22SsaNYfdPBldt6+dBcjH7VUwv
-
Quasar family
-
Quasar payload
-
Executes dropped EXE
-