General
-
Target
download.png
-
Size
4KB
-
Sample
241001-xx3lnszckb
-
MD5
53be45ec1a8da5bf21e4af595221cd6e
-
SHA1
78fe5f060e9ac3a34d16d0fcc74ae155622362b6
-
SHA256
ea277f3d1af0d063b093aa6b1d74de1460c68c43b2656760e0dd86c3f1d8e50d
-
SHA512
fd784b321a158d7e742d04730f066283a45c28e8f37aa40c058236c0154a18dee019f6d608991d090bc68f37681141494f3f300ca07f5fb21bbb0cacf59fc328
-
SSDEEP
96:oKShRfnDx46uwJtb7VxWV7F49qqRQGtCTWxpyMFck6rDrsOL0C7136IqejOZtCtY:oKSHDKrwLVgqqqRQOwWxD6ksrsON7130
Static task
static1
Behavioral task
behavioral1
Sample
download.png
Resource
win10v2004-20240802-en
Malware Config
Extracted
crimsonrat
185.136.161.124
Targets
-
-
Target
download.png
-
Size
4KB
-
MD5
53be45ec1a8da5bf21e4af595221cd6e
-
SHA1
78fe5f060e9ac3a34d16d0fcc74ae155622362b6
-
SHA256
ea277f3d1af0d063b093aa6b1d74de1460c68c43b2656760e0dd86c3f1d8e50d
-
SHA512
fd784b321a158d7e742d04730f066283a45c28e8f37aa40c058236c0154a18dee019f6d608991d090bc68f37681141494f3f300ca07f5fb21bbb0cacf59fc328
-
SSDEEP
96:oKShRfnDx46uwJtb7VxWV7F49qqRQGtCTWxpyMFck6rDrsOL0C7136IqejOZtCtY:oKSHDKrwLVgqqqRQOwWxD6ksrsON7130
-
CrimsonRAT main payload
-
Downloads MZ/PE file
-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-