Analysis
-
max time kernel
19s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-02-2024 13:39
Static task
static1
Behavioral task
behavioral1
Sample
CrimsonRAT.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
CrimsonRAT.exe
Resource
win10v2004-20231215-en
General
-
Target
CrimsonRAT.exe
-
Size
84KB
-
MD5
b6e148ee1a2a3b460dd2a0adbf1dd39c
-
SHA1
ec0efbe8fd2fa5300164e9e4eded0d40da549c60
-
SHA256
dc31e710277eac1b125de6f4626765a2684d992147691a33964e368e5f269cba
-
SHA512
4b8c62ddfc7cd3e5ce1f8b5a1ba4a611ab1bfccf81d80cf2cfc831cffa1d7a4b6da0494616a53b419168bc3a324b57382d4a6186af083de6fc93d144c4503741
-
SSDEEP
1536:IjoAILD000jsdtP66K3uch3bCuExwwSV712fRp1Oo2IeG:IqLD000wD6VRhLbzwSv2H1beG
Malware Config
Extracted
crimsonrat
185.136.161.124
Signatures
-
CrimsonRAT main payload 2 IoCs
resource yara_rule behavioral2/files/0x00070000000231f9-25.dat family_crimsonrat behavioral2/files/0x00070000000231f9-33.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation CrimsonRAT.exe -
Executes dropped EXE 1 IoCs
pid Process 3092 dlrarhsiva.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 992 wrote to memory of 3092 992 CrimsonRAT.exe 84 PID 992 wrote to memory of 3092 992 CrimsonRAT.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\CrimsonRAT.exe"C:\Users\Admin\AppData\Local\Temp\CrimsonRAT.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:992 -
C:\ProgramData\Hdlharas\dlrarhsiva.exe"C:\ProgramData\Hdlharas\dlrarhsiva.exe"2⤵
- Executes dropped EXE
PID:3092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD5d3603c3613f8fecdc0c15edda239d8ae
SHA1d1467b8b58a139866d432bc45c31469bab94383c
SHA2565464f0dada06805283631741d73b775249f08b6a76ee15c10175a3b628963877
SHA51234d516a8d408bf63c79231870481cd2de2cf2e1651c949ee7b5904e217be7622700c74f8a9be3b88a846351029cdf8b4067c4582cceeb5417ebcca2cbba9b321
-
Filesize
384KB
MD5534b9391200855b698e894a71e5ba3fa
SHA16a05233273305ef5c21a75750214cb808aac983f
SHA2560df0a7941a95e86b6d6dba9d26a592c16feaf4a80bb6e29ef602acc0fa44f264
SHA5122bf8264fe254e061f13ebd8d2d174d0121c886a4ccf6e3b815036125a5117a475014200e897896e6627260f2fb4d2dc243814d70ec51e9225db547f744841fdf
-
Filesize
56KB
MD5b635f6f767e485c7e17833411d567712
SHA15a9cbdca7794aae308c44edfa7a1ff5b155e4aa8
SHA2566838286fb88e9e4e68882601a13fa770f1b510a0a86389b6a29070a129bf2e5e
SHA512551ba05bd44e66685f359802b35a8c9775792a12844906b4b53e1a000d56624c6db323754331c9f399072790991c1b256d9114a50fb78111652a1c973d2880af