General
-
Target
RNSM00441.7z
-
Size
53.5MB
-
Sample
241024-y8ymjashkr
-
MD5
1f07deb824d20334eca9d63413320f1f
-
SHA1
56067bd17bbe30dfde1b4105924688227931f668
-
SHA256
adc85b9fc63f672336e015658cfa59663940299f1c7e7cb3c867423606f85c5a
-
SHA512
2aa3e8aa6df2a4832c22c92b4e8f78725296e201b777ffed0ef6ffccdd53f09eb82ec6e40b0e67cf9dfff869af156e6136832ddf9948d3a090c6bba977fd7bd4
-
SSDEEP
1572864:PW+3Sr6Ioq3gdUBA1cE6K7HPLmgk3CRlTRCrwb9Zs3:PWSsoqwWAYCvnkyPlCrw9Zs3
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00441.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
crimsonrat
107.175.1.103
Extracted
C:\Program Files\Common Files\DESIGNER\Read_Me.txt
http://24cduc2htewrcv37.onion/?ZQXPGDPQ
http://helpqvrg3cc5mvb3.onion/
Extracted
C:\Program Files (x86)\readme.txt
conti
http://contirecj4hbzmyzuydyzrvm2c65blmvhoj2cvf25zqj2dwrrqcq5oad.onion/
https://contirecovery.top/
Extracted
C:\Users\Admin\3D Objects\6iMSN88k_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Desktop\00441\6iMSN88k_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Contacts\6iMSN88k_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Desktop\00441\6iMSN88k_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Desktop\00441\6iMSN88k_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Extracted
C:\Users\Admin\Documents\OneNote Notebooks\6iMSN88k_readme_.txt
avaddon
http://avaddongun7rngel.onion
http://avaddonbotrxmuyl.onion
Targets
-
-
Target
RNSM00441.7z
-
Size
53.5MB
-
MD5
1f07deb824d20334eca9d63413320f1f
-
SHA1
56067bd17bbe30dfde1b4105924688227931f668
-
SHA256
adc85b9fc63f672336e015658cfa59663940299f1c7e7cb3c867423606f85c5a
-
SHA512
2aa3e8aa6df2a4832c22c92b4e8f78725296e201b777ffed0ef6ffccdd53f09eb82ec6e40b0e67cf9dfff869af156e6136832ddf9948d3a090c6bba977fd7bd4
-
SSDEEP
1572864:PW+3Sr6Ioq3gdUBA1cE6K7HPLmgk3CRlTRCrwb9Zs3:PWSsoqwWAYCvnkyPlCrw9Zs3
-
Avaddon
Ransomware-as-a-service first released in June 2020 and currently expanding its userbase among criminal actors.
-
Avaddon payload
-
CrimsonRAT main payload
-
GandCrab payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (3859) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Execution
System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
1File Deletion
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4