Malware Analysis Report

2024-10-19 10:21

Sample ID 220121-2xcsgaccgq
Target e60ad9543b873569432bc05cbfc8dd0f72a618f26eb256f15048b820e151846e
SHA256 e60ad9543b873569432bc05cbfc8dd0f72a618f26eb256f15048b820e151846e
Tags
crimsonrat rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e60ad9543b873569432bc05cbfc8dd0f72a618f26eb256f15048b820e151846e

Threat Level: Known bad

The file e60ad9543b873569432bc05cbfc8dd0f72a618f26eb256f15048b820e151846e was found to be: Known bad.

Malicious Activity Summary

crimsonrat rat

CrimsonRAT Main Payload

CrimsonRat

Executes dropped EXE

Drops file in Program Files directory

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-01-21 22:57

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2022-01-21 22:57

Reported

2022-01-21 23:25

Platform

win10-en-20211208

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\MoI Operation\MoI Operation.exe"

Signatures

CrimsonRAT Main Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

CrimsonRat

rat crimsonrat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Ladhnara\nirtbivaes.exe N/A

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2432 wrote to memory of 1184 N/A C:\Users\Admin\AppData\Local\Temp\MoI Operation\MoI Operation.exe C:\ProgramData\Ladhnara\nirtbivaes.exe
PID 2432 wrote to memory of 1184 N/A C:\Users\Admin\AppData\Local\Temp\MoI Operation\MoI Operation.exe C:\ProgramData\Ladhnara\nirtbivaes.exe

Processes

C:\Users\Admin\AppData\Local\Temp\MoI Operation\MoI Operation.exe

"C:\Users\Admin\AppData\Local\Temp\MoI Operation\MoI Operation.exe"

C:\ProgramData\Ladhnara\nirtbivaes.exe

"C:\ProgramData\Ladhnara\nirtbivaes.exe"

Network

Country Destination Domain Proto
US 64.188.12.126:6658 tcp
US 64.188.12.126:4676 tcp

Files

memory/2432-118-0x0000000000D70000-0x0000000000D72000-memory.dmp

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 c1a8625fd15f04171bd32a9d95ffba5b
SHA1 d960f728e3312447063d209e6534bc28f615df9f
SHA256 451bb1928d4ecfcbc351c6859614f64d3648d4f4fc8a50f270542d6a07512697
SHA512 d648fb73d31b7ccb79218351c6fecd70df6a55f56c7e16d4ca6f932b761032d52bb4cea7fce73a4ae1b5b205bacd0b631349c11efa3f2b7958a6e4323fb1ebe0

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 c1a8625fd15f04171bd32a9d95ffba5b
SHA1 d960f728e3312447063d209e6534bc28f615df9f
SHA256 451bb1928d4ecfcbc351c6859614f64d3648d4f4fc8a50f270542d6a07512697
SHA512 d648fb73d31b7ccb79218351c6fecd70df6a55f56c7e16d4ca6f932b761032d52bb4cea7fce73a4ae1b5b205bacd0b631349c11efa3f2b7958a6e4323fb1ebe0

memory/1184-121-0x00000256BEE80000-0x00000256BF842000-memory.dmp

memory/1184-122-0x00000256DACC0000-0x00000256DACC2000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2022-01-21 22:57

Reported

2022-01-21 23:26

Platform

win7-en-20211208

Max time kernel

122s

Max time network

146s

Command Line

"C:\Users\Admin\AppData\Local\Temp\MoI Operation\MoI Operation.exe"

Signatures

CrimsonRAT Main Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

CrimsonRat

rat crimsonrat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\ProgramData\Ladhnara\nirtbivaes.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~3\Ladhnara\nirtbivaes.exe C:\Users\Admin\AppData\Local\Temp\MoI Operation\MoI Operation.exe N/A
File created C:\PROGRA~3\Ladhnara\nirtbivaes.exe C:\Users\Admin\AppData\Local\Temp\MoI Operation\MoI Operation.exe N/A

Enumerates physical storage devices

Processes

C:\Users\Admin\AppData\Local\Temp\MoI Operation\MoI Operation.exe

"C:\Users\Admin\AppData\Local\Temp\MoI Operation\MoI Operation.exe"

C:\ProgramData\Ladhnara\nirtbivaes.exe

"C:\ProgramData\Ladhnara\nirtbivaes.exe"

Network

Country Destination Domain Proto
US 64.188.12.126:6658 tcp

Files

memory/1368-55-0x0000000000AB0000-0x0000000000AB2000-memory.dmp

memory/1368-56-0x000007FEF2220000-0x000007FEF32B6000-memory.dmp

memory/1368-57-0x0000000000AB6000-0x0000000000AD5000-memory.dmp

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 8d42aaeaa6fc19c74b744ccf20e51150
SHA1 e350b04dc8a3005649c8d54716b740c37d12dd53
SHA256 47b99e50430e9abad7326d1837ecdda5f995112b0b12406d23df5ef603d52a4e
SHA512 818fb089c26750dea3f1ef5aafed065398fa0be2106e37bf5727e3c30868f9e5af71484c837371aaa09de4fbd36d345c2a813dd1f6e65cfff8ff01bebab80d19

C:\ProgramData\Ladhnara\nirtbivaes.exe

MD5 8d42aaeaa6fc19c74b744ccf20e51150
SHA1 e350b04dc8a3005649c8d54716b740c37d12dd53
SHA256 47b99e50430e9abad7326d1837ecdda5f995112b0b12406d23df5ef603d52a4e
SHA512 818fb089c26750dea3f1ef5aafed065398fa0be2106e37bf5727e3c30868f9e5af71484c837371aaa09de4fbd36d345c2a813dd1f6e65cfff8ff01bebab80d19

memory/292-60-0x000007FEF2220000-0x000007FEF32B6000-memory.dmp

memory/292-62-0x0000000000A26000-0x0000000000A45000-memory.dmp

memory/292-61-0x0000000000A20000-0x0000000000A22000-memory.dmp