General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1231440804208312402/1231440887524098109/Krampus.exe?ex=6636f7b2&is=662482b2&hm=072248e040c57d6f50f4ca9d0edc0521a56014940da22fafd562acef7e2e9afd&
Resource
win11-20240412-en
Behavioral task
behavioral2
Sample
https://cdn.discordapp.com/attachments/1231440804208312402/1231440887524098109/Krampus.exe?ex=6636f7b2&is=662482b2&hm=072248e040c57d6f50f4ca9d0edc0521a56014940da22fafd562acef7e2e9afd&
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral3
Sample
https://cdn.discordapp.com/attachments/1231440804208312402/1231440887524098109/Krampus.exe?ex=6636f7b2&is=662482b2&hm=072248e040c57d6f50f4ca9d0edc0521a56014940da22fafd562acef7e2e9afd&
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral4
Sample
https://cdn.discordapp.com/attachments/1231440804208312402/1231440887524098109/Krampus.exe?ex=6636f7b2&is=662482b2&hm=072248e040c57d6f50f4ca9d0edc0521a56014940da22fafd562acef7e2e9afd&
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral5
Sample
https://cdn.discordapp.com/attachments/1231440804208312402/1231440887524098109/Krampus.exe?ex=6636f7b2&is=662482b2&hm=072248e040c57d6f50f4ca9d0edc0521a56014940da22fafd562acef7e2e9afd&
Resource
debian9-mipsel-20240226-en
Malware Config
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1231440804208312402/1231440887524098109/Krampus.exe?ex=6636f7b2&is=662482b2&hm=072248e040c57d6f50f4ca9d0edc0521a56014940da22fafd562acef7e2e9afd&
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-