General
-
Target
.
-
Size
147KB
-
Sample
240503-vtwb3sbf8t
-
MD5
5a86190d2432d5a97e5e68a6a1b4c7e2
-
SHA1
124ebb185402143551cff607e9e8658bd594dfcd
-
SHA256
9bf38073eddcb98b0ddeb3785326c2624d40592f326ccb7f78757886ec25d573
-
SHA512
b5c0d15f0476c872e36fe29e21e69fa551fdc4e1140c34aa18b4bd305b6ab1b33621a25a2fab222b79f6af6cc6804eb0c9848f9b4b80d17a52f1f3eccd9cc9ae
-
SSDEEP
1536:o4kud8LonVJoqYarK4DsYNgRyypRMPuNPV5nPztP4FPfaParP8R4DJ2PWTllU0ru:TkPL6WVMllhAY9HhqiS
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win11-20240419-en
Malware Config
Extracted
crimsonrat
185.136.161.124
Extracted
revengerat
Guest
0.tcp.ngrok.io:19521
RV_MUTEX
Targets
-
-
Target
.
-
Size
147KB
-
MD5
5a86190d2432d5a97e5e68a6a1b4c7e2
-
SHA1
124ebb185402143551cff607e9e8658bd594dfcd
-
SHA256
9bf38073eddcb98b0ddeb3785326c2624d40592f326ccb7f78757886ec25d573
-
SHA512
b5c0d15f0476c872e36fe29e21e69fa551fdc4e1140c34aa18b4bd305b6ab1b33621a25a2fab222b79f6af6cc6804eb0c9848f9b4b80d17a52f1f3eccd9cc9ae
-
SSDEEP
1536:o4kud8LonVJoqYarK4DsYNgRyypRMPuNPV5nPztP4FPfaParP8R4DJ2PWTllU0ru:TkPL6WVMllhAY9HhqiS
-
CrimsonRAT main payload
-
RevengeRat Executable
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Uses the VBS compiler for execution
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-