General
-
Target
RNSM00323.7z
-
Size
7.5MB
-
Sample
241112-w3tehsycrr
-
MD5
33ba43580498e09684c08d92bd7f6639
-
SHA1
aa89e6b43737f58eea83e1ef98c366883b3420dc
-
SHA256
7d0b46f42ee73f4fe0084d3a6abe734fed72972162c1ae1ff391b8ac498f9440
-
SHA512
d6a81b59df43573730ca45d93f20e03ad3ca4dcab25fc1a22b1f352c61b6eb9efad83e00e406bcf80b7b3c3a43be80cbb3d4d98ee2d3ea49faf61dc3e12dcd32
-
SSDEEP
196608:Uq3khxO0zyYw1KDiUGHgMuOII1Ez++taojRDVoNX:+xGXIwgMz1utaoJV+X
Static task
static1
Behavioral task
behavioral1
Sample
RNSM00323.7z
Resource
win7-20241010-en
Malware Config
Extracted
crimsonrat
185.125.206.237
233.125.211.121
Extracted
C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\HOW TO DECRYPT FILES.txt
3KxEZKjS4ifAHhX2o1fq9tERkAshSgA4hg
https://coinatmradar.com/
https://www.localbitcoins.com/
Targets
-
-
Target
RNSM00323.7z
-
Size
7.5MB
-
MD5
33ba43580498e09684c08d92bd7f6639
-
SHA1
aa89e6b43737f58eea83e1ef98c366883b3420dc
-
SHA256
7d0b46f42ee73f4fe0084d3a6abe734fed72972162c1ae1ff391b8ac498f9440
-
SHA512
d6a81b59df43573730ca45d93f20e03ad3ca4dcab25fc1a22b1f352c61b6eb9efad83e00e406bcf80b7b3c3a43be80cbb3d4d98ee2d3ea49faf61dc3e12dcd32
-
SSDEEP
196608:Uq3khxO0zyYw1KDiUGHgMuOII1Ez++taojRDVoNX:+xGXIwgMz1utaoJV+X
-
CrimsonRAT main payload
-
Crimsonrat family
-
Mimikatz family
-
Rms family
-
Renames multiple (329) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
mimikatz is an open source tool to dump credentials on Windows
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-