General
-
Target
20240410_224239.png
-
Size
8KB
-
Sample
240716-cg2dfssgjg
-
MD5
73d8b6f0a522c3a29aaf4e90c8876fb3
-
SHA1
d8252b0e9473976f23d55651c7633d9ac81f61a2
-
SHA256
e275085a3056b02e23e330a109ada4c610354bfa5f06b1a2d774de4dde7f9c1d
-
SHA512
9f9240f04c26ce9c3e3c93f8327367ac90202ab616eb6c651625ad65c495ad1e2ccaed761da516cb4b9f10abe6b7770fcd4dd0bc4a7994e1c7cb93a1cfbf77b9
-
SSDEEP
192:jwynuGklwSRteNGDaUs2T0hKXupfKneqoRYMi2xKDvI7Srm:jwD9/egJs2/ukeLNtQvISa
Static task
static1
Behavioral task
behavioral1
Sample
20240410_224239.png
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
20240410_224239.png
Resource
win11-20240709-en
Malware Config
Extracted
crimsonrat
185.136.161.124
Extracted
revengerat
Guest
0.tcp.ngrok.io:19521
RV_MUTEX
Targets
-
-
Target
20240410_224239.png
-
Size
8KB
-
MD5
73d8b6f0a522c3a29aaf4e90c8876fb3
-
SHA1
d8252b0e9473976f23d55651c7633d9ac81f61a2
-
SHA256
e275085a3056b02e23e330a109ada4c610354bfa5f06b1a2d774de4dde7f9c1d
-
SHA512
9f9240f04c26ce9c3e3c93f8327367ac90202ab616eb6c651625ad65c495ad1e2ccaed761da516cb4b9f10abe6b7770fcd4dd0bc4a7994e1c7cb93a1cfbf77b9
-
SSDEEP
192:jwynuGklwSRteNGDaUs2T0hKXupfKneqoRYMi2xKDvI7Srm:jwD9/egJs2/ukeLNtQvISa
-
CrimsonRAT main payload
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Modifies WinLogon for persistence
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (565) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
RevengeRat Executable
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables use of System Restore points
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Modifies Windows Firewall
-
Possible privilege escalation attempt
-
Deletes itself
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Impair Defenses: Safe Mode Boot
-
Loads dropped DLL
-
Modifies file permissions
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1Scripting
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
4Accessibility Features
1Component Object Model Hijacking
1Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Event Triggered Execution
4Accessibility Features
1Component Object Model Hijacking
1Image File Execution Options Injection
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Safe Mode Boot
1Indicator Removal
2File Deletion
2Modify Registry
6Scripting
1