General

  • Target

    RNSM00443.7z

  • Size

    98.7MB

  • Sample

    241024-xbl2ss1ajk

  • MD5

    ffd83cd295f7cbc6d53e04355002f1f7

  • SHA1

    10537b6b3ab6ea409ce1b4051e947f3b78d33f68

  • SHA256

    720447db58834d8082eefc2f5b97e7567a6c6c6337c2e40300894fe8a467b671

  • SHA512

    be26c60d2ce2cf987ff33d1645a82220903edc986e9acef4add8d676d39e4083f2e6e7af0797639e2a4910dd43313b987beb15b8cc9c9cbd5f49cc2696f1d614

  • SSDEEP

    1572864:BLWlEuS5AE1Iq4FF3FJzDHuIHOp0+jMPEVDlxbQsApL/PtqclAT93WV5ajmYMHcj:BSqfAnq4FrBRH+jZVf05/lqGeQimPcj3

Malware Config

Extracted

Family

crimsonrat

C2

167.160.166.80

Targets

    • Target

      RNSM00443.7z

    • Size

      98.7MB

    • MD5

      ffd83cd295f7cbc6d53e04355002f1f7

    • SHA1

      10537b6b3ab6ea409ce1b4051e947f3b78d33f68

    • SHA256

      720447db58834d8082eefc2f5b97e7567a6c6c6337c2e40300894fe8a467b671

    • SHA512

      be26c60d2ce2cf987ff33d1645a82220903edc986e9acef4add8d676d39e4083f2e6e7af0797639e2a4910dd43313b987beb15b8cc9c9cbd5f49cc2696f1d614

    • SSDEEP

      1572864:BLWlEuS5AE1Iq4FF3FJzDHuIHOp0+jMPEVDlxbQsApL/PtqclAT93WV5ajmYMHcj:BSqfAnq4FrBRH+jZVf05/lqGeQimPcj3

    • CrimsonRat

      Crimson RAT is a malware linked to a Pakistani-linked threat actor.

    • Detect MafiaWare666 ransomware

    • MafiaWare666 Ransomware

      MafiaWare666 is ransomware written in C# with multiple variants.

    • Modifies WinLogon for persistence

    • VanillaRat

      VanillaRat is an advanced remote administration tool coded in C#.

    • Renames multiple (85) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • Vanilla Rat payload

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.