General
-
Target
93f33e4e9a732de665510aa5fdc565fc00bcf5e28101c5cc55b5b16f94288b8a
-
Size
180KB
-
Sample
240410-px2qdabb7t
-
MD5
adb4e3f7a2fe9170d7421413e6faf6a3
-
SHA1
ca1a4cbcf6940ab5f6384739df1ef7f4ef4d1e7d
-
SHA256
93f33e4e9a732de665510aa5fdc565fc00bcf5e28101c5cc55b5b16f94288b8a
-
SHA512
a415ad6f87e286b96a8e3ecff63f439c5b37afee1b9fadc196a7a10cc11507ca33d042330267e83e64d64291f6c149fb9ad92608d451e1cb99b773a0ff0b8c9a
-
SSDEEP
3072:zY3waTy1N00JCNLWt1NoKNLMeOSKt58yWtpfog1/3+RVuFZxTUhrm9A+g9gfisAM:UgCy1RuLy1NdOSvp51P+OTwrWA/uA4M2
Behavioral task
behavioral1
Sample
Guidelines.xlam
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Guidelines.xlam
Resource
win10v2004-20240226-en
Malware Config
Extracted
crimsonrat
185.136.161.124
Targets
-
-
Target
Guidelines.xlam
-
Size
127KB
-
MD5
e0f6bcdb71df502f7aefe22db8207a69
-
SHA1
9f7357219cbfb5b940d5809f8564a6bb821fa036
-
SHA256
0335de8eadbbd5dc7cbe92ef869bcea6f6596ac39a38680142c982ec6e97ecde
-
SHA512
ea9fc5fe2bcd8a225c7f7f7b8ea832e3d143278a07c6264edaf9476fb5e7852efdd9b3dbcde6e211ccb1e6d011b11845def65af58e9298a01b3067a05200d7cc
-
SSDEEP
3072:NDKcDiVBG5Q0fULY/fPiY4XXnfWFsnNfWSWe:NDDD0BGCY/fkXvTNf5
Score10/10-
CrimsonRAT main payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-