Analysis
-
max time kernel
157s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2024 13:36
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BackDoor.CrimsonNET.14.8459.4902.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BackDoor.CrimsonNET.14.8459.4902.exe
Resource
win10v2004-20240226-en
General
-
Target
SecuriteInfo.com.BackDoor.CrimsonNET.14.8459.4902.exe
-
Size
16.9MB
-
MD5
55b3cfd78d9e2624d769acdfc5522753
-
SHA1
38a7f5b0ca7f508497bbfb42d32184b001367308
-
SHA256
504c7549caa901ca24a04915fe221236b3f41c947c7857c9d4634f3dbe31592e
-
SHA512
c1268ce97ad5c3f242ab78aeefb93fdbb06c693a149927240041c88db93ddb427d277459273b035263ae344da42044b3f449af0235310c547a437b14c869d608
-
SSDEEP
768:eaQjTpc2IVZM23zLnh8nLZ7FLOMaabW8FqZRGT7O:ZQjTpcpZM23PhqLZ7YmxY7c
Malware Config
Extracted
crimsonrat
204.44.124.81
Signatures
-
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.CrimsonNET.14.8459.4902.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BackDoor.CrimsonNET.14.8459.4902.exe"1⤵PID:1180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1404 --field-trial-handle=2328,i,5873823382323802923,13134441441264702821,262144 --variations-seed-version /prefetch:81⤵PID:844