Resubmissions

27-10-2024 06:37

241027-hdl29asnap 10

27-10-2024 06:34

241027-hbv75ssrav 8

General

  • Target

    The-MALWARE-Repo

  • Size

    298KB

  • Sample

    241027-hdl29asnap

  • MD5

    07c71f38ba70d3cd08780578f673366b

  • SHA1

    91920288a31959a00ba02ee68dbe64c874203e01

  • SHA256

    a2706ced712d733502af5ba0f15945a7c9744aa2fb1d9d98cc7aa3c128c5b523

  • SHA512

    56b93f6a9f77f715bca4b4fa07bfde2adf7440d8b01b8048bf1eb7cb6b446e15d0b4eaa9299dd001e3ea33d4c9fd30761334aebbccd9eb55528eeb50297b3cf6

  • SSDEEP

    6144:yLouSpOL/saqkPV9FemLtcsDSsmwF9VvZJT3CqbMrhryf65NRPaCieMjAkvCJv1N:AouSpOL/saqkPV9FemLtcsDSsmwF9Vv4

Malware Config

Extracted

Family

crimsonrat

C2

185.136.161.124

Targets

    • Target

      The-MALWARE-Repo

    • Size

      298KB

    • MD5

      07c71f38ba70d3cd08780578f673366b

    • SHA1

      91920288a31959a00ba02ee68dbe64c874203e01

    • SHA256

      a2706ced712d733502af5ba0f15945a7c9744aa2fb1d9d98cc7aa3c128c5b523

    • SHA512

      56b93f6a9f77f715bca4b4fa07bfde2adf7440d8b01b8048bf1eb7cb6b446e15d0b4eaa9299dd001e3ea33d4c9fd30761334aebbccd9eb55528eeb50297b3cf6

    • SSDEEP

      6144:yLouSpOL/saqkPV9FemLtcsDSsmwF9VvZJT3CqbMrhryf65NRPaCieMjAkvCJv1N:AouSpOL/saqkPV9FemLtcsDSsmwF9Vv4

    • CrimsonRAT main payload

    • CrimsonRat

      Crimson RAT is a malware linked to a Pakistani-linked threat actor.

    • Crimsonrat family

    • UAC bypass

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks