General

  • Target

    c2a635767c84df8471d4f614b9c35b2ba75070b0c9f8c3721fc0aaace79dcc73

  • Size

    59KB

  • Sample

    220420-ew2nwafddk

  • MD5

    9882ba138b96b395eea3c3b542633f60

  • SHA1

    185ba36c072edb8ed7494e889e88047808ff2f4f

  • SHA256

    c2a635767c84df8471d4f614b9c35b2ba75070b0c9f8c3721fc0aaace79dcc73

  • SHA512

    c742360bc636925148f29f00ee7407d485b97c1bcffa40b8f92a885cfe7743ea65195d2842844574828c7720c1381b144755e59ded9eff4a97aa7aa127c0e7f4

Score
10/10

Malware Config

Targets

    • Target

      c2a635767c84df8471d4f614b9c35b2ba75070b0c9f8c3721fc0aaace79dcc73

    • Size

      59KB

    • MD5

      9882ba138b96b395eea3c3b542633f60

    • SHA1

      185ba36c072edb8ed7494e889e88047808ff2f4f

    • SHA256

      c2a635767c84df8471d4f614b9c35b2ba75070b0c9f8c3721fc0aaace79dcc73

    • SHA512

      c742360bc636925148f29f00ee7407d485b97c1bcffa40b8f92a885cfe7743ea65195d2842844574828c7720c1381b144755e59ded9eff4a97aa7aa127c0e7f4

    Score
    10/10
    • CrimsonRAT Main Payload

    • CrimsonRat

      Crimson RAT is a malware linked to a Pakistani-linked threat actor.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v6

Tasks