General
-
Target
RNSM00454.7z
-
Size
84.9MB
-
Sample
241012-vy7wnswgjq
-
MD5
391bfe45681ded9a5a7e7e6063727629
-
SHA1
120937367da31f9558cba1dfe7b8aea5b6575da2
-
SHA256
f3b6d60a35a32fdd5258c1e11edc9ce65df5e892a33481dcc6c726600b2110ee
-
SHA512
0516ccd2112ec0c160b05eeb4908be69de658d251d88eeab2b4cd753a65df5281c2e2d82ac849d17abff846081d599d6da862e4304467f536cb2133d67448da8
-
SSDEEP
1572864:LmS6K58FcJehSSkvcD//V3XqtTCkBHkiDLkyrk38ezJ6uT5r1ZP5T5zSGj/b3hI:qSbxJUtzpQe8oMk376uTV1ZxTwmbO
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00454.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
crimsonrat
173.249.21.206
Extracted
njrat
0.7NC
NYAN CAT
ant-ec.duckdns.org:2054
2c1ed4d1ae
-
reg_key
2c1ed4d1ae
-
splitter
@!#&^%$
Extracted
asyncrat
0.5.7B
Default
0.tcp.ap.ngrok.io:10906
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Extracted
asyncrat
0.5.6A
null
185.19.85.183:55001
185.19.85.183:55029
vklkueujfvqaumi
-
delay
5
-
install
false
-
install_folder
%AppData%
Extracted
snakekeylogger
Protocol: ftp- Host:
ftp://ftp.ecurs.ro/ - Port:
21 - Username:
[email protected] - Password:
dGZ5eznXv76y
Extracted
nullmixer
http://motiwa.xyz/
Extracted
C:\Users\Admin\Pictures\_README.txt
1E6qZkzbGZHh9hWF4dQcTUdbmsYkvBYPrR
Extracted
C:\Users\Admin\Pictures\_README.txt
1E6qZkzbGZHh9hWF4dQcTUdbmsYkvBYPrR
Targets
-
-
Target
RNSM00454.7z
-
Size
84.9MB
-
MD5
391bfe45681ded9a5a7e7e6063727629
-
SHA1
120937367da31f9558cba1dfe7b8aea5b6575da2
-
SHA256
f3b6d60a35a32fdd5258c1e11edc9ce65df5e892a33481dcc6c726600b2110ee
-
SHA512
0516ccd2112ec0c160b05eeb4908be69de658d251d88eeab2b4cd753a65df5281c2e2d82ac849d17abff846081d599d6da862e4304467f536cb2133d67448da8
-
SSDEEP
1572864:LmS6K58FcJehSSkvcD//V3XqtTCkBHkiDLkyrk38ezJ6uT5r1ZP5T5zSGj/b3hI:qSbxJUtzpQe8oMk376uTV1ZxTwmbO
-
CrimsonRAT main payload
-
Detect MafiaWare666 ransomware
-
GandCrab payload
-
MafiaWare666 Ransomware
MafiaWare666 is ransomware written in C# with multiple variants.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Snake Keylogger payload
-
Async RAT payload
-
Core1 .NET packer
Detects packer/loader used by .NET malware.
-
Orcurs Rat Executable
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Modifies file permissions
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Uses Tor communications
Malware can proxy its traffic through Tor for more anonymity.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1