General

  • Target

    RNSM00323.7z

  • Size

    7.5MB

  • Sample

    241112-w3tehsycrr

  • MD5

    33ba43580498e09684c08d92bd7f6639

  • SHA1

    aa89e6b43737f58eea83e1ef98c366883b3420dc

  • SHA256

    7d0b46f42ee73f4fe0084d3a6abe734fed72972162c1ae1ff391b8ac498f9440

  • SHA512

    d6a81b59df43573730ca45d93f20e03ad3ca4dcab25fc1a22b1f352c61b6eb9efad83e00e406bcf80b7b3c3a43be80cbb3d4d98ee2d3ea49faf61dc3e12dcd32

  • SSDEEP

    196608:Uq3khxO0zyYw1KDiUGHgMuOII1Ez++taojRDVoNX:+xGXIwgMz1utaoJV+X

Malware Config

Extracted

Family

crimsonrat

C2

185.125.206.237

233.125.211.121

Extracted

Path

C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\HOW TO DECRYPT FILES.txt

Ransom Note
YOUR SYSTEM IS LOCKED AND ALL YOUR IMPORTANT DATA HAS BEEN ENCRYPTED. DON'T WORRY YOUR FILES ARE SAFE. TO RETURN ALL TO NORMALLY YOU MUST BUY THE CERBER DECRYPTOR PROGRAM. PAYMENTS ARE ACCEPTED ONLY THROUGH THE BITCOIN NETWORK. YOU CAN GET THEM VIA ATM MACHINE OR ONLINE https://coinatmradar.com/ (find a ATM) https://www.localbitcoins.com/ (buy instantly online any country) THE PRICE FOR DECRYPTOR SOFTWARE IS 0.8 BTC BTC ADRESS : 3KxEZKjS4ifAHhX2o1fq9tERkAshSgA4hg (where you need to make the payment) VERRY IMPORTANT ! DO NOT TRY TO SCAN WITH ANTIVIRUS YOU RISK LOSING YOUR DATA . ANTIVIRUSES ONLY DESTROY THE ENCRYPTED DATA , THEY DO NOT KNOW THE ALGORITH WITH WICH THE ENTIRE SYSTEM WAS ENCRYPTED. THE ONLY WAY TO DECRYPT YOUR SYSTEM AND RETURN TO NORMAL IS TO BUY THE ORIGINAL DECRYPTOR SOFTWARE. For more information : [email protected] (24/7) Subject : SYSTEM-LOCKED-ID: 10191895
Wallets

3KxEZKjS4ifAHhX2o1fq9tERkAshSgA4hg

URLs

https://coinatmradar.com/

https://www.localbitcoins.com/

Targets

    • Target

      RNSM00323.7z

    • Size

      7.5MB

    • MD5

      33ba43580498e09684c08d92bd7f6639

    • SHA1

      aa89e6b43737f58eea83e1ef98c366883b3420dc

    • SHA256

      7d0b46f42ee73f4fe0084d3a6abe734fed72972162c1ae1ff391b8ac498f9440

    • SHA512

      d6a81b59df43573730ca45d93f20e03ad3ca4dcab25fc1a22b1f352c61b6eb9efad83e00e406bcf80b7b3c3a43be80cbb3d4d98ee2d3ea49faf61dc3e12dcd32

    • SSDEEP

      196608:Uq3khxO0zyYw1KDiUGHgMuOII1Ez++taojRDVoNX:+xGXIwgMz1utaoJV+X

    • CrimsonRAT main payload

    • CrimsonRat

      Crimson RAT is a malware linked to a Pakistani-linked threat actor.

    • Crimsonrat family

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Mimikatz family

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Rms family

    • Renames multiple (329) files with added filename extension

      This suggests ransomware activity of encrypting all the files on the system.

    • mimikatz is an open source tool to dump credentials on Windows

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Legitimate hosting services abused for malware hosting/C2

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks