General
-
Target
567b82c892f10a5cc6d0286c5777e7462cec7182eba81db7dd7de53d1e8d3274
-
Size
267KB
-
Sample
230217-rmcplsfg79
-
MD5
f6dab5861b5907b39004712c58bbfb04
-
SHA1
d5e8b77806150ba31efd82e05db7e678a3f52874
-
SHA256
567b82c892f10a5cc6d0286c5777e7462cec7182eba81db7dd7de53d1e8d3274
-
SHA512
b2dfc9ee64521d25a19e2867cf3446e06bde9c65988ff3e2924d8a8eee76f4553ba0cdc9e953f848d3c6a8e96d0d57874cb0df6fc94dc2402425d4634109e16c
-
SSDEEP
3072:8Oym1KpUZdaR/HJaBOz2lnyHS29h5ueYQ:LymIIeHJLcGB
Static task
static1
Behavioral task
behavioral1
Sample
567b82c892f10a5cc6d0286c5777e7462cec7182eba81db7dd7de53d1e8d3274.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
567b82c892f10a5cc6d0286c5777e7462cec7182eba81db7dd7de53d1e8d3274.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
crimsonrat
209.127.16.126
Targets
-
-
Target
567b82c892f10a5cc6d0286c5777e7462cec7182eba81db7dd7de53d1e8d3274
-
Size
267KB
-
MD5
f6dab5861b5907b39004712c58bbfb04
-
SHA1
d5e8b77806150ba31efd82e05db7e678a3f52874
-
SHA256
567b82c892f10a5cc6d0286c5777e7462cec7182eba81db7dd7de53d1e8d3274
-
SHA512
b2dfc9ee64521d25a19e2867cf3446e06bde9c65988ff3e2924d8a8eee76f4553ba0cdc9e953f848d3c6a8e96d0d57874cb0df6fc94dc2402425d4634109e16c
-
SSDEEP
3072:8Oym1KpUZdaR/HJaBOz2lnyHS29h5ueYQ:LymIIeHJLcGB
Score10/10-
CrimsonRAT main payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-