General
-
Target
RNSM00425.7z
-
Size
65.2MB
-
Sample
241027-tddawsxkaw
-
MD5
dabbff286a8d34b5350c7c612cb0735f
-
SHA1
18de8d3eae3a277552208dc6f99869229abf6b91
-
SHA256
b30e8c7eb1efc8302da7b9c95f361c4d4fe9bc0a620d83851fcaffd501145bda
-
SHA512
fb9cc4dc805c405fb18f8fc662e10134399937563cda7debe7c3699ad8a077f2b56204f1e130ba6cf6eaa960741c94afa80f4e27f7b6d9791b927bc8588b6bc3
-
SSDEEP
1572864:qSmj82NPdgwgTSOehA3nh/hgLvCaBBncoIJAfxh8N1Z:Uj8wPdBKchA3nlqBRzA
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00425.7z
Resource
win10v2004-20241007-en
Malware Config
Extracted
crimsonrat
23.254.119.118
122.216.31.108
Extracted
C:\Recovery\WindowsRE\How To Restore Your Files.txt
http://babukq4e2p4wu4iq.onion/login.php?id=qrkurJuYkvPsMF4sX5avnaBrUHldGe
Extracted
C:\Users\how_to_back_files.html
Targets
-
-
Target
RNSM00425.7z
-
Size
65.2MB
-
MD5
dabbff286a8d34b5350c7c612cb0735f
-
SHA1
18de8d3eae3a277552208dc6f99869229abf6b91
-
SHA256
b30e8c7eb1efc8302da7b9c95f361c4d4fe9bc0a620d83851fcaffd501145bda
-
SHA512
fb9cc4dc805c405fb18f8fc662e10134399937563cda7debe7c3699ad8a077f2b56204f1e130ba6cf6eaa960741c94afa80f4e27f7b6d9791b927bc8588b6bc3
-
SSDEEP
1572864:qSmj82NPdgwgTSOehA3nh/hgLvCaBBncoIJAfxh8N1Z:Uj8wPdBKchA3nlqBRzA
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
CrimsonRAT main payload
-
Crimsonrat family
-
XMRig Miner payload
-
Xmrig family
-
AgentTesla payload
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Accessibility Features
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Access Token Manipulation
1Create Process with Token
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Accessibility Features
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Access Token Manipulation
1Create Process with Token
1Direct Volume Access
1Impair Defenses
2Disable or Modify System Firewall
1Indicator Removal
2File Deletion
2Modify Registry
1