General
-
Target
RNSM00444.7z
-
Size
60.2MB
-
Sample
241024-w6jpgszhkq
-
MD5
8d5f6c6746238d28a1073cbb4f020a74
-
SHA1
bdedfc8f61016e3fa3201ce0f501c42324c0786f
-
SHA256
84746e0b57050f68a3aa093b75731cf3aa321fb41534d55392525b105d164a54
-
SHA512
c1a359269836364730cc84a4a90bf2a1e9fd4933f7d1cb48194a8d1c99c15429e86a177f0ff4ea33a025e8583f108f4b01ea52d7341918ab339bf29a7d8ec256
-
SSDEEP
1572864:KzWRBEEP/N7M4wNhmpqdsALScA/CWHemATVzltiXGp9FMyf1+Y0ab:Rnb/N5qm1ALMHemalPL0ab
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00444.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
crimsonrat
167.160.166.80
198.23.210.211
Targets
-
-
Target
RNSM00444.7z
-
Size
60.2MB
-
MD5
8d5f6c6746238d28a1073cbb4f020a74
-
SHA1
bdedfc8f61016e3fa3201ce0f501c42324c0786f
-
SHA256
84746e0b57050f68a3aa093b75731cf3aa321fb41534d55392525b105d164a54
-
SHA512
c1a359269836364730cc84a4a90bf2a1e9fd4933f7d1cb48194a8d1c99c15429e86a177f0ff4ea33a025e8583f108f4b01ea52d7341918ab339bf29a7d8ec256
-
SSDEEP
1572864:KzWRBEEP/N7M4wNhmpqdsALScA/CWHemATVzltiXGp9FMyf1+Y0ab:Rnb/N5qm1ALMHemalPL0ab
-
Detect MafiaWare666 ransomware
-
Detect ZGRat V2
-
MafiaWare666 Ransomware
MafiaWare666 is ransomware written in C# with multiple variants.
-
Modifies WinLogon for persistence
-
Renames multiple (1246) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Downloads PsExec from SysInternals website
Sysinternals tools like PsExec are often leveraged maliciously by malware families due to being commonly used by testers/administrators.
-
Modifies Windows Firewall
-
System Binary Proxy Execution: Regsvcs/Regasm
Abuse Regasm to proxy execution of malicious code.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Access Token Manipulation
1Create Process with Token
1Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
6System Binary Proxy Execution
1Regsvcs/Regasm
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Service Discovery
1Peripheral Device Discovery
2Query Registry
3Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1