Analysis

  • max time kernel
    26s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2023 00:16

General

  • Target

    CraxsRatV3/Craxs-RAT-Builder.exe

  • Size

    159KB

  • MD5

    0d1b1c61a083b253810ede683435e6bc

  • SHA1

    3a1c3f7a2d18d614a76d938d94b3af6f75580d9f

  • SHA256

    fb486189117a81dcce0e772311fd220162e02214d37e6bdde408790e18d10bdb

  • SHA512

    dc30d2428e2c1e14ca3a4243c8dd58f44068580a08d53480205086f43790b533579757a158118c9b45d8f15899437b9e305caa4a5a24e299a83fc51a057151e3

  • SSDEEP

    1536:xdLBmgrojz6evQxNMBO1/pWhvCYbV7/9UtGwy7a37HM1Zgeroy:LUsojiMSBWhvX5C+GQ1J

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\CraxsRatV3\Craxs-RAT-Builder.exe
    "C:\Users\Admin\AppData\Local\Temp\CraxsRatV3\Craxs-RAT-Builder.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1100

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1100-54-0x0000000000310000-0x000000000033E000-memory.dmp

    Filesize

    184KB

  • memory/1100-55-0x0000000004810000-0x0000000004850000-memory.dmp

    Filesize

    256KB