General

  • Target

    20240410_224239.png

  • Size

    8KB

  • Sample

    240716-cg2dfssgjg

  • MD5

    73d8b6f0a522c3a29aaf4e90c8876fb3

  • SHA1

    d8252b0e9473976f23d55651c7633d9ac81f61a2

  • SHA256

    e275085a3056b02e23e330a109ada4c610354bfa5f06b1a2d774de4dde7f9c1d

  • SHA512

    9f9240f04c26ce9c3e3c93f8327367ac90202ab616eb6c651625ad65c495ad1e2ccaed761da516cb4b9f10abe6b7770fcd4dd0bc4a7994e1c7cb93a1cfbf77b9

  • SSDEEP

    192:jwynuGklwSRteNGDaUs2T0hKXupfKneqoRYMi2xKDvI7Srm:jwD9/egJs2/ukeLNtQvISa

Malware Config

Extracted

Family

crimsonrat

C2

185.136.161.124

Extracted

Family

revengerat

Botnet

Guest

C2

0.tcp.ngrok.io:19521

Mutex

RV_MUTEX

Targets

    • Target

      20240410_224239.png

    • Size

      8KB

    • MD5

      73d8b6f0a522c3a29aaf4e90c8876fb3

    • SHA1

      d8252b0e9473976f23d55651c7633d9ac81f61a2

    • SHA256

      e275085a3056b02e23e330a109ada4c610354bfa5f06b1a2d774de4dde7f9c1d

    • SHA512

      9f9240f04c26ce9c3e3c93f8327367ac90202ab616eb6c651625ad65c495ad1e2ccaed761da516cb4b9f10abe6b7770fcd4dd0bc4a7994e1c7cb93a1cfbf77b9

    • SSDEEP

      192:jwynuGklwSRteNGDaUs2T0hKXupfKneqoRYMi2xKDvI7Srm:jwD9/egJs2/ukeLNtQvISa

    • CrimsonRAT main payload

    • CrimsonRat

      Crimson RAT is a malware linked to a Pakistani-linked threat actor.

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Dharma

      Dharma is a ransomware that uses security software installation to hide malicious activities.

    • Modifies WinLogon for persistence

    • Modifies Windows Defender Real-time Protection settings

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • UAC bypass

    • Deletes shadow copies

      Ransomware often targets backup files to inhibit system recovery.

    • Renames multiple (565) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • RevengeRat Executable

    • Disables RegEdit via registry modification

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Event Triggered Execution: Image File Execution Options Injection

    • Modifies Windows Firewall

    • Possible privilege escalation attempt

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Deletes itself

    • Drops startup file

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Impair Defenses: Safe Mode Boot

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks