General
-
Target
WaveCracked.exe
-
Size
17.8MB
-
Sample
240717-pg92tatbng
-
MD5
befc855906a931a247dac42f51f94dcc
-
SHA1
d0c611c614a9697b10c6f58c9dc91c0e12670b25
-
SHA256
2924eb7ce3f424a385b71823017af1b572fe19e8c91fdf1be26a712891f57a74
-
SHA512
cdcdb109e2170ea4d878e8080a3227efe3c1e658226740f82c11c0e2a8df97328d31f1293b3ab8568af91fd39ea2fbe283fbe41d8875d8ef4ac5d051cb77168b
-
SSDEEP
393216:E7TliC76u0Mz6VzVgqd5kTiy9o9KNHkzMmsW0W3WWRqusbMGCNFxHWN:YiC76u0M6VGqcTiChWAjBZMGyF2
Static task
static1
Behavioral task
behavioral1
Sample
WaveCracked.exe
Resource
win10-20240404-en
Malware Config
Extracted
quasar
1.4.1
Steam
20.ip.gl.ply.gg:55257
15d4edb7-40c0-4a95-9dc8-8fe93071bce0
-
encryption_key
F1B995FFCFBEAA3218870A13F82413DC65D82218
-
install_name
Steam.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SteamClient
-
subdirectory
%appdata%
Targets
-
-
Target
WaveCracked.exe
-
Size
17.8MB
-
MD5
befc855906a931a247dac42f51f94dcc
-
SHA1
d0c611c614a9697b10c6f58c9dc91c0e12670b25
-
SHA256
2924eb7ce3f424a385b71823017af1b572fe19e8c91fdf1be26a712891f57a74
-
SHA512
cdcdb109e2170ea4d878e8080a3227efe3c1e658226740f82c11c0e2a8df97328d31f1293b3ab8568af91fd39ea2fbe283fbe41d8875d8ef4ac5d051cb77168b
-
SSDEEP
393216:E7TliC76u0Mz6VzVgqd5kTiy9o9KNHkzMmsW0W3WWRqusbMGCNFxHWN:YiC76u0M6VGqcTiChWAjBZMGyF2
-
Detect Umbral payload
-
Quasar payload
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-