General

  • Target

    fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe

  • Size

    3.1MB

  • Sample

    240512-bz272adc52

  • MD5

    f1dd84b637552358cfc4b9dda1dc04f7

  • SHA1

    118d8a8f4df0bd95303c977f2fa2883dbd8f4222

  • SHA256

    fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413

  • SHA512

    ff54ac3d296fa0907a073922b19067c942b398290c86d7b2b176f5d15c49b6486348499ac5f121aef8e5bb9ecbd1c4c6d00320528ac6b82701ccec64cf91f5da

  • SSDEEP

    49152:GvUt62XlaSFNWPjljiFa2RoUYI5zbvsBx3AoGdkTHHB72eh2NT:GvI62XlaSFNWPjljiFXRoUYI5fvr

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Krampus.gg

C2

10.0.0.76:4782

Mutex

b2297f47-c39d-4f55-91d6-74d9f38e9fd1

Attributes
  • encryption_key

    21407C13DE42FCCADE77E86119A8CD11B5DCC515

  • install_name

    Krampus.gg.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Quasar Client Startup

  • subdirectory

    SubDir

Targets

    • Target

      fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe

    • Size

      3.1MB

    • MD5

      f1dd84b637552358cfc4b9dda1dc04f7

    • SHA1

      118d8a8f4df0bd95303c977f2fa2883dbd8f4222

    • SHA256

      fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413

    • SHA512

      ff54ac3d296fa0907a073922b19067c942b398290c86d7b2b176f5d15c49b6486348499ac5f121aef8e5bb9ecbd1c4c6d00320528ac6b82701ccec64cf91f5da

    • SSDEEP

      49152:GvUt62XlaSFNWPjljiFa2RoUYI5zbvsBx3AoGdkTHHB72eh2NT:GvI62XlaSFNWPjljiFXRoUYI5fvr

    • Quasar RAT

      Quasar is an open source Remote Access Tool.

    • Quasar payload

    • Detects Windows executables referencing non-Windows User-Agents

    • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.

    • Detects executables containing common artifacts observed in infostealers

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks