General
-
Target
fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe
-
Size
3.1MB
-
Sample
240512-bz272adc52
-
MD5
f1dd84b637552358cfc4b9dda1dc04f7
-
SHA1
118d8a8f4df0bd95303c977f2fa2883dbd8f4222
-
SHA256
fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413
-
SHA512
ff54ac3d296fa0907a073922b19067c942b398290c86d7b2b176f5d15c49b6486348499ac5f121aef8e5bb9ecbd1c4c6d00320528ac6b82701ccec64cf91f5da
-
SSDEEP
49152:GvUt62XlaSFNWPjljiFa2RoUYI5zbvsBx3AoGdkTHHB72eh2NT:GvI62XlaSFNWPjljiFXRoUYI5fvr
Behavioral task
behavioral1
Sample
fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
quasar
1.4.1
Krampus.gg
10.0.0.76:4782
b2297f47-c39d-4f55-91d6-74d9f38e9fd1
-
encryption_key
21407C13DE42FCCADE77E86119A8CD11B5DCC515
-
install_name
Krampus.gg.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Targets
-
-
Target
fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413.exe
-
Size
3.1MB
-
MD5
f1dd84b637552358cfc4b9dda1dc04f7
-
SHA1
118d8a8f4df0bd95303c977f2fa2883dbd8f4222
-
SHA256
fc3e553270ca9ee914c8b813393d3a2a659a2a18e51b6a730036348bc4cae413
-
SHA512
ff54ac3d296fa0907a073922b19067c942b398290c86d7b2b176f5d15c49b6486348499ac5f121aef8e5bb9ecbd1c4c6d00320528ac6b82701ccec64cf91f5da
-
SSDEEP
49152:GvUt62XlaSFNWPjljiFa2RoUYI5zbvsBx3AoGdkTHHB72eh2NT:GvI62XlaSFNWPjljiFXRoUYI5fvr
Score10/10-
Quasar payload
-
Detects Windows executables referencing non-Windows User-Agents
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing common artifacts observed in infostealers
-
Executes dropped EXE
-