Malware Analysis Report

2024-10-19 10:21

Sample ID 220121-2ttxksbha7
Target f26998a89d011af5860fa5c9cccf3ee09c81b14156824bdbee21e3229c7cba4b
SHA256 f26998a89d011af5860fa5c9cccf3ee09c81b14156824bdbee21e3229c7cba4b
Tags
crimsonrat rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f26998a89d011af5860fa5c9cccf3ee09c81b14156824bdbee21e3229c7cba4b

Threat Level: Known bad

The file f26998a89d011af5860fa5c9cccf3ee09c81b14156824bdbee21e3229c7cba4b was found to be: Known bad.

Malicious Activity Summary

crimsonrat rat

CrimsonRAT Main Payload

CrimsonRat

Executes dropped EXE

Drops file in Program Files directory

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-01-21 22:52

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2022-01-21 22:52

Reported

2022-01-21 23:00

Platform

win7-en-20211208

Max time kernel

117s

Max time network

130s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Personal Data\Personal Data.exe"

Signatures

CrimsonRAT Main Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

CrimsonRat

rat crimsonrat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Ladhnara\nirtbivaes.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\PROGRA~3\Ladhnara\nirtbivaes.exe C:\Users\Admin\AppData\Local\Temp\Personal Data\Personal Data.exe N/A
File opened for modification C:\PROGRA~3\Ladhnara\nirtbivaes.exe C:\Users\Admin\AppData\Local\Temp\Personal Data\Personal Data.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\Personal Data\Personal Data.exe

"C:\Users\Admin\AppData\Local\Temp\Personal Data\Personal Data.exe"

C:\ProgramData\Ladhnara\nirtbivaes.exe

"C:\ProgramData\Ladhnara\nirtbivaes.exe"

Network

Country Destination Domain Proto
US 64.188.12.126:6658 tcp
NL 142.250.179.174:443 tcp

Files

memory/1624-55-0x0000000001FF0000-0x0000000001FF2000-memory.dmp

memory/1624-56-0x000007FEF1F00000-0x000007FEF2F96000-memory.dmp

memory/1624-57-0x0000000001FF6000-0x0000000002015000-memory.dmp

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 8d42aaeaa6fc19c74b744ccf20e51150
SHA1 e350b04dc8a3005649c8d54716b740c37d12dd53
SHA256 47b99e50430e9abad7326d1837ecdda5f995112b0b12406d23df5ef603d52a4e
SHA512 818fb089c26750dea3f1ef5aafed065398fa0be2106e37bf5727e3c30868f9e5af71484c837371aaa09de4fbd36d345c2a813dd1f6e65cfff8ff01bebab80d19

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 8d42aaeaa6fc19c74b744ccf20e51150
SHA1 e350b04dc8a3005649c8d54716b740c37d12dd53
SHA256 47b99e50430e9abad7326d1837ecdda5f995112b0b12406d23df5ef603d52a4e
SHA512 818fb089c26750dea3f1ef5aafed065398fa0be2106e37bf5727e3c30868f9e5af71484c837371aaa09de4fbd36d345c2a813dd1f6e65cfff8ff01bebab80d19

memory/1016-60-0x000007FEF1F00000-0x000007FEF2F96000-memory.dmp

memory/1016-61-0x00000000028F0000-0x00000000028F2000-memory.dmp

memory/1016-62-0x00000000028F6000-0x0000000002915000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-01-21 22:52

Reported

2022-01-21 23:00

Platform

win10-en-20211208

Max time kernel

120s

Max time network

130s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Personal Data\Personal Data.exe"

Signatures

CrimsonRAT Main Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

CrimsonRat

rat crimsonrat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Ladhnara\nirtbivaes.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\Personal Data\Personal Data.exe

"C:\Users\Admin\AppData\Local\Temp\Personal Data\Personal Data.exe"

C:\ProgramData\Ladhnara\nirtbivaes.exe

"C:\ProgramData\Ladhnara\nirtbivaes.exe"

Network

Country Destination Domain Proto
US 52.109.8.21:443 tcp
US 64.188.12.126:6658 tcp

Files

memory/368-118-0x00000000026A0000-0x00000000026A2000-memory.dmp

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 c1a8625fd15f04171bd32a9d95ffba5b
SHA1 d960f728e3312447063d209e6534bc28f615df9f
SHA256 451bb1928d4ecfcbc351c6859614f64d3648d4f4fc8a50f270542d6a07512697
SHA512 d648fb73d31b7ccb79218351c6fecd70df6a55f56c7e16d4ca6f932b761032d52bb4cea7fce73a4ae1b5b205bacd0b631349c11efa3f2b7958a6e4323fb1ebe0

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 c1a8625fd15f04171bd32a9d95ffba5b
SHA1 d960f728e3312447063d209e6534bc28f615df9f
SHA256 451bb1928d4ecfcbc351c6859614f64d3648d4f4fc8a50f270542d6a07512697
SHA512 d648fb73d31b7ccb79218351c6fecd70df6a55f56c7e16d4ca6f932b761032d52bb4cea7fce73a4ae1b5b205bacd0b631349c11efa3f2b7958a6e4323fb1ebe0

memory/820-122-0x00000288D3C80000-0x00000288D4642000-memory.dmp

memory/820-123-0x00000288EEB60000-0x00000288EEB62000-memory.dmp