General
-
Target
CraxsRAT.exe
-
Size
3.1MB
-
Sample
240112-t64njscde3
-
MD5
91b64c75d01266c4517dce67f9c999e0
-
SHA1
6d925d60815f7f2fe7a19a8313e659ceaa2b8bd6
-
SHA256
9683f82a11711238bb9e9484854334d9d1af93594182de5f7e86126c9f23cd4e
-
SHA512
104e509b5786869cf87daad38d4625f967539d8f7f8c501ade4bee1b256d49b6f2524e188a781192303e340affcb767b03bdb3307ae9d90f7fdcb449f90c6d1e
-
SSDEEP
49152:LvRG42pda6D+/PjlLOlg6yQipVHdRJ6SbR3LoGdYTHHB72eh2NT:Lvg42pda6D+/PjlLOlZyQipVHdRJ6M
Behavioral task
behavioral1
Sample
CraxsRAT.exe
Resource
win7-20231215-en
Malware Config
Extracted
quasar
1.4.1
METRO
109.123.239.168:4782
45.92.1.39:4782
192.227.190.146:4782
10726cc3-bb08-45ab-bcfa-a1a801fe7c81
-
encryption_key
F16E7DF50DE6CE52DF130EC90AB8BEDCE6392AE8
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3001
-
startup_key
msdrvhost
-
subdirectory
Google Extensions
Targets
-
-
Target
CraxsRAT.exe
-
Size
3.1MB
-
MD5
91b64c75d01266c4517dce67f9c999e0
-
SHA1
6d925d60815f7f2fe7a19a8313e659ceaa2b8bd6
-
SHA256
9683f82a11711238bb9e9484854334d9d1af93594182de5f7e86126c9f23cd4e
-
SHA512
104e509b5786869cf87daad38d4625f967539d8f7f8c501ade4bee1b256d49b6f2524e188a781192303e340affcb767b03bdb3307ae9d90f7fdcb449f90c6d1e
-
SSDEEP
49152:LvRG42pda6D+/PjlLOlg6yQipVHdRJ6SbR3LoGdYTHHB72eh2NT:Lvg42pda6D+/PjlLOlZyQipVHdRJ6M
-
Quasar payload
-
Executes dropped EXE
-