General
-
Target
RNSM00449.7z
-
Size
144.2MB
-
Sample
241015-zgr64szfnm
-
MD5
f206ad177f3f8ccc84509a938107200b
-
SHA1
45c789c3ac7cdfc34e38e47198bf55ea49ec2dcd
-
SHA256
a513460aca621b82a0f03d4f11297ba49e2c026a8ccb025bb838778fbd8cbf51
-
SHA512
f79b83f6ab22cc9bac0486f68f3a9dbde4557baf69d76a99ada3732e4c2d4ba27baf6aaab9e21c555e4b78ff6915df9e21fc5269425554669a00baa9c5439a91
-
SSDEEP
3145728:uVYBVf+gyzv13IWFhqr0Goa6s9GS+00E5bxQxFKoJY05+XVh7RAjI0j:0YbmBv13IWyr159Z0ImxFKoXaNRAjT
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00449.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
crimsonrat
134.119.181.142
10.5.26.108
Extracted
C:\Program Files\Common Files\microsoft shared\ink\ar-SA\!! READ ME !!.txt
http://cuba4mp6ximo2zlo.onion/
Targets
-
-
Target
RNSM00449.7z
-
Size
144.2MB
-
MD5
f206ad177f3f8ccc84509a938107200b
-
SHA1
45c789c3ac7cdfc34e38e47198bf55ea49ec2dcd
-
SHA256
a513460aca621b82a0f03d4f11297ba49e2c026a8ccb025bb838778fbd8cbf51
-
SHA512
f79b83f6ab22cc9bac0486f68f3a9dbde4557baf69d76a99ada3732e4c2d4ba27baf6aaab9e21c555e4b78ff6915df9e21fc5269425554669a00baa9c5439a91
-
SSDEEP
3145728:uVYBVf+gyzv13IWFhqr0Goa6s9GS+00E5bxQxFKoJY05+XVh7RAjI0j:0YbmBv13IWyr159Z0ImxFKoXaNRAjT
-
Disables Task Manager via registry modification
-
Possible privilege escalation attempt
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Modifies file permissions
-
Legitimate hosting services abused for malware hosting/C2
-