General

  • Target

    CraxsRAT.exe

  • Size

    3.1MB

  • MD5

    91b64c75d01266c4517dce67f9c999e0

  • SHA1

    6d925d60815f7f2fe7a19a8313e659ceaa2b8bd6

  • SHA256

    9683f82a11711238bb9e9484854334d9d1af93594182de5f7e86126c9f23cd4e

  • SHA512

    104e509b5786869cf87daad38d4625f967539d8f7f8c501ade4bee1b256d49b6f2524e188a781192303e340affcb767b03bdb3307ae9d90f7fdcb449f90c6d1e

  • SSDEEP

    49152:LvRG42pda6D+/PjlLOlg6yQipVHdRJ6SbR3LoGdYTHHB72eh2NT:Lvg42pda6D+/PjlLOlZyQipVHdRJ6M

Score
10/10

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

METRO

C2

109.123.239.168:4782

45.92.1.39:4782

192.227.190.146:4782

Mutex

10726cc3-bb08-45ab-bcfa-a1a801fe7c81

Attributes
  • encryption_key

    F16E7DF50DE6CE52DF130EC90AB8BEDCE6392AE8

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3001

  • startup_key

    msdrvhost

  • subdirectory

    Google Extensions

Signatures

  • Quasar family
  • Quasar payload 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • CraxsRAT.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections