Malware Analysis Report

2024-07-28 07:33

Sample ID 240611-edh4tatfnj
Target CraxsRat_c.exe
SHA256 80b0e2088ef10b54fc32db663a53be2211b4ed47cbb025a0fa8bce365e99ad64
Tags
score
3/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
3/10

SHA256

80b0e2088ef10b54fc32db663a53be2211b4ed47cbb025a0fa8bce365e99ad64

Threat Level: Likely benign

The file CraxsRat_c.exe was found to be: Likely benign.

Malicious Activity Summary


Unsigned PE

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-11 03:49

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-11 03:49

Reported

2024-06-11 03:51

Platform

win11-20240426-en

Max time kernel

30s

Max time network

42s

Command Line

"C:\Users\Admin\AppData\Local\Temp\CraxsRat_c.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\CraxsRat_c.exe

"C:\Users\Admin\AppData\Local\Temp\CraxsRat_c.exe"

Network

Country Destination Domain Proto
GB 184.28.176.83:443 tcp
GB 184.28.176.83:443 tcp
US 8.8.8.8:53 browser.pipe.aria.microsoft.com udp
US 20.189.173.3:443 browser.pipe.aria.microsoft.com tcp
US 8.8.8.8:53 3.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 6.160.77.104.in-addr.arpa udp
NL 23.62.61.194:443 r.bing.com tcp
NL 23.62.61.194:443 r.bing.com tcp
NL 23.62.61.194:443 r.bing.com tcp
NL 23.62.61.194:443 r.bing.com tcp
NL 23.62.61.194:443 r.bing.com tcp
NL 23.62.61.194:443 r.bing.com tcp

Files

memory/2512-0-0x00007FFC80FE3000-0x00007FFC80FE5000-memory.dmp

memory/2512-1-0x0000020D63A00000-0x0000020D679B6000-memory.dmp