Malware Analysis Report

2024-10-19 10:21

Sample ID 220121-21dh6scddp
Target dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e
SHA256 dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e
Tags
crimsonrat rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e

Threat Level: Known bad

The file dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e was found to be: Known bad.

Malicious Activity Summary

crimsonrat rat

CrimsonRAT Main Payload

CrimsonRat

Executes dropped EXE

Drops file in Program Files directory

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-01-21 23:02

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-01-21 23:02

Reported

2022-01-21 23:30

Platform

win7-en-20211208

Max time kernel

151s

Max time network

129s

Command Line

"C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe"

Signatures

CrimsonRAT Main Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

CrimsonRat

rat crimsonrat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Ladhnara\nirtbivaes.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\PROGRA~3\Ladhnara\nirtbivaes.exe C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe N/A
File opened for modification C:\PROGRA~3\Ladhnara\nirtbivaes.exe C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe

"C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe"

C:\ProgramData\Ladhnara\nirtbivaes.exe

"C:\ProgramData\Ladhnara\nirtbivaes.exe"

Network

Country Destination Domain Proto
US 64.188.12.126:6658 tcp
US 64.188.12.126:4676 tcp

Files

memory/1412-54-0x0000000001000000-0x000000000106A000-memory.dmp

memory/1412-55-0x000000001B300000-0x000000001B302000-memory.dmp

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 8d42aaeaa6fc19c74b744ccf20e51150
SHA1 e350b04dc8a3005649c8d54716b740c37d12dd53
SHA256 47b99e50430e9abad7326d1837ecdda5f995112b0b12406d23df5ef603d52a4e
SHA512 818fb089c26750dea3f1ef5aafed065398fa0be2106e37bf5727e3c30868f9e5af71484c837371aaa09de4fbd36d345c2a813dd1f6e65cfff8ff01bebab80d19

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 8d42aaeaa6fc19c74b744ccf20e51150
SHA1 e350b04dc8a3005649c8d54716b740c37d12dd53
SHA256 47b99e50430e9abad7326d1837ecdda5f995112b0b12406d23df5ef603d52a4e
SHA512 818fb089c26750dea3f1ef5aafed065398fa0be2106e37bf5727e3c30868f9e5af71484c837371aaa09de4fbd36d345c2a813dd1f6e65cfff8ff01bebab80d19

memory/1376-58-0x0000000000B80000-0x0000000000B82000-memory.dmp

memory/1376-59-0x000007FEEB910000-0x000007FEEC9A6000-memory.dmp

memory/1376-60-0x0000000000B86000-0x0000000000BA5000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-01-21 23:02

Reported

2022-01-21 23:30

Platform

win10-en-20211208

Max time kernel

140s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe"

Signatures

CrimsonRAT Main Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

CrimsonRat

rat crimsonrat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Ladhnara\nirtbivaes.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe

"C:\Users\Admin\AppData\Local\Temp\dfa54dc6c171740352006b7125219b1fd9cd1403be4a3440c1ad1acb1b42d37e.exe"

C:\ProgramData\Ladhnara\nirtbivaes.exe

"C:\ProgramData\Ladhnara\nirtbivaes.exe"

Network

Country Destination Domain Proto
US 35.208.104.210:443 tcp
US 52.109.8.21:443 tcp
US 64.188.12.126:6658 tcp
US 64.188.12.126:4676 tcp

Files

memory/2452-115-0x000001CDE7660000-0x000001CDE76CA000-memory.dmp

memory/2452-116-0x000001CDE9BA0000-0x000001CDE9BA2000-memory.dmp

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 c1a8625fd15f04171bd32a9d95ffba5b
SHA1 d960f728e3312447063d209e6534bc28f615df9f
SHA256 451bb1928d4ecfcbc351c6859614f64d3648d4f4fc8a50f270542d6a07512697
SHA512 d648fb73d31b7ccb79218351c6fecd70df6a55f56c7e16d4ca6f932b761032d52bb4cea7fce73a4ae1b5b205bacd0b631349c11efa3f2b7958a6e4323fb1ebe0

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 c1a8625fd15f04171bd32a9d95ffba5b
SHA1 d960f728e3312447063d209e6534bc28f615df9f
SHA256 451bb1928d4ecfcbc351c6859614f64d3648d4f4fc8a50f270542d6a07512697
SHA512 d648fb73d31b7ccb79218351c6fecd70df6a55f56c7e16d4ca6f932b761032d52bb4cea7fce73a4ae1b5b205bacd0b631349c11efa3f2b7958a6e4323fb1ebe0

memory/652-119-0x000001461CDD0000-0x000001461D792000-memory.dmp

memory/652-120-0x0000014637F10000-0x0000014637F12000-memory.dmp