General
-
Target
redirect
-
Size
6KB
-
Sample
241003-s24mbasgpk
-
MD5
93b8b59320af83c53bbaab1661137a09
-
SHA1
2cfa0c10a0ef87cd9630ac3d92fedfc3f550358c
-
SHA256
7f2da7f0f82b191709e85c12f6bd369f2f17ce687083de9bff14d75a1c94f3d1
-
SHA512
b24a83a1e568fc45232abe2dd141467ec8757494ad9bd4fd12c9fb7146ed810c33ac154eb16adc6ddc48ed62dc522be32412d2247bd8cc631ec97f04c03f3a58
-
SSDEEP
192:diHLxX7777/77QF7Kyr80Lod4BYCIkZOVXn:dir5HYK0+CIkZOVXn
Static task
static1
Behavioral task
behavioral1
Sample
redirect.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
redirect.html
Resource
win10v2004-20240802-en
Malware Config
Extracted
warzonerat
168.61.222.215:5400
Extracted
revengerat
Guest
0.tcp.ngrok.io:19521
RV_MUTEX
Extracted
modiloader
https://drive.google.com/u/0/uc?id=1TcSctGVBajYMA7CFDc158wpvqkpxmkhJ&export=download
Extracted
crimsonrat
185.136.161.124
Targets
-
-
Target
redirect
-
Size
6KB
-
MD5
93b8b59320af83c53bbaab1661137a09
-
SHA1
2cfa0c10a0ef87cd9630ac3d92fedfc3f550358c
-
SHA256
7f2da7f0f82b191709e85c12f6bd369f2f17ce687083de9bff14d75a1c94f3d1
-
SHA512
b24a83a1e568fc45232abe2dd141467ec8757494ad9bd4fd12c9fb7146ed810c33ac154eb16adc6ddc48ed62dc522be32412d2247bd8cc631ec97f04c03f3a58
-
SSDEEP
192:diHLxX7777/77QF7Kyr80Lod4BYCIkZOVXn:dir5HYK0+CIkZOVXn
-
CrimsonRAT main payload
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
ModiLoader First Stage
-
RevengeRat Executable
-
Warzone RAT payload
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Modifies Windows Firewall
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Uses the VBS compiler for execution
-
Abuse Elevation Control Mechanism: Bypass User Account Control
UAC Bypass Attempt via SilentCleanup Task.
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
2Bypass User Account Control
2Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
2Bypass User Account Control
2Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
4Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1