Malware Analysis Report

2024-10-19 10:21

Sample ID 220121-2wlc8acccr
Target e903e54fed007ee14305bc21219b3fab69385e4df16714d737da5953f7f3c170
SHA256 e903e54fed007ee14305bc21219b3fab69385e4df16714d737da5953f7f3c170
Tags
crimsonrat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e903e54fed007ee14305bc21219b3fab69385e4df16714d737da5953f7f3c170

Threat Level: Known bad

The file e903e54fed007ee14305bc21219b3fab69385e4df16714d737da5953f7f3c170 was found to be: Known bad.

Malicious Activity Summary

crimsonrat

CrimsonRAT Main Payload

Crimsonrat family

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2022-01-21 22:56

Signatures

CrimsonRAT Main Payload

Description Indicator Process Target
N/A N/A N/A N/A

Crimsonrat family

crimsonrat

Analysis: behavioral1

Detonation Overview

Submitted

2022-01-21 22:55

Reported

2022-01-21 23:23

Platform

win7-en-20211208

Max time kernel

156s

Max time network

184s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ignvdmvra.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ignvdmvra.exe

"C:\Users\Admin\AppData\Local\Temp\ignvdmvra.exe"

Network

Country Destination Domain Proto
FR 151.106.14.125:6818 tcp
FR 151.106.14.125:3468 tcp
FR 151.106.14.125:16418 tcp

Files

memory/1656-55-0x000007FEF2D20000-0x000007FEF3DB6000-memory.dmp

memory/1656-56-0x0000000002AE0000-0x0000000002AE2000-memory.dmp

memory/1656-57-0x0000000002AE6000-0x0000000002B05000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-01-21 22:55

Reported

2022-01-21 23:22

Platform

win10-en-20211208

Max time kernel

157s

Max time network

176s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ignvdmvra.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\ignvdmvra.exe

"C:\Users\Admin\AppData\Local\Temp\ignvdmvra.exe"

Network

Country Destination Domain Proto
FR 151.106.14.125:6818 tcp
FR 151.106.14.125:3468 tcp
US 8.8.8.8:53 oneocsp.microsoft.com udp
US 204.79.197.203:80 oneocsp.microsoft.com tcp
US 8.8.8.8:53 www.microsoft.com udp
NL 104.123.41.162:80 www.microsoft.com tcp

Files

memory/2428-117-0x0000000003320000-0x0000000003322000-memory.dmp

memory/2428-118-0x0000000003322000-0x0000000003324000-memory.dmp