General
-
Target
RNSM00398.7z
-
Size
35.6MB
-
Sample
241031-zl8pna1rcs
-
MD5
3b49730191d772ce76f948b1df95b031
-
SHA1
7d52bb20e716d41b4dcaa71d76b23425a6dfd260
-
SHA256
a1941a5b8cdbf7cd067ee8c9005c6d8ee3b83c5b6aa8d11328596488ca158c84
-
SHA512
19b7f11784844562eff25c2d68e9a44ab071d064ce15ebe86592d918bcc3eb55a0c584d345842a7f5357914beb8d39d726528f9d79f2773bfebf86726caf640f
-
SSDEEP
786432:2x/uG7WdVIu/Dwno4l2xVPtp+yxk3DX2m99a73uw2HK13W2n:2x/XUIu/DSUxVP7+yGam907+RHK9
Static task
static1
Malware Config
Extracted
crimsonrat
66.154.113.38
Targets
-
-
Target
RNSM00398.7z
-
Size
35.6MB
-
MD5
3b49730191d772ce76f948b1df95b031
-
SHA1
7d52bb20e716d41b4dcaa71d76b23425a6dfd260
-
SHA256
a1941a5b8cdbf7cd067ee8c9005c6d8ee3b83c5b6aa8d11328596488ca158c84
-
SHA512
19b7f11784844562eff25c2d68e9a44ab071d064ce15ebe86592d918bcc3eb55a0c584d345842a7f5357914beb8d39d726528f9d79f2773bfebf86726caf640f
-
SSDEEP
786432:2x/uG7WdVIu/Dwno4l2xVPtp+yxk3DX2m99a73uw2HK13W2n:2x/XUIu/DSUxVP7+yGam907+RHK9
-
CrimsonRAT main payload
-
Crimsonrat family
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-