General

  • Target

    Thunder Free.exe

  • Size

    3.2MB

  • Sample

    241208-gl6k7avpfv

  • MD5

    eca98d2c56e4f340d9cf6571ba359f5a

  • SHA1

    a93442327357e844ea68274554dc0052d93b0862

  • SHA256

    b3846b72c3635aad8929d4908bc5bb131ffea57f41879f00a68b3c1207eaa1f3

  • SHA512

    afbf97d2d203405f0e850116f4eeb662a476df770c6517f3a4aece62550483941ce48d50d590239647e292d01ed91e9445c85f21f6d234e645dbf8e59b62669a

  • SSDEEP

    49152:eXdV944HnLTdse8o3zN+RLn36PSAwdxgn1GDaeRbTj2bAuSfSPyI:eNTrTdn8ojURji/8+2bj20pfuy

Malware Config

Extracted

Family

crimsonrat

C2

185.136.161.124

Targets

    • Target

      Thunder Free.exe

    • Size

      3.2MB

    • MD5

      eca98d2c56e4f340d9cf6571ba359f5a

    • SHA1

      a93442327357e844ea68274554dc0052d93b0862

    • SHA256

      b3846b72c3635aad8929d4908bc5bb131ffea57f41879f00a68b3c1207eaa1f3

    • SHA512

      afbf97d2d203405f0e850116f4eeb662a476df770c6517f3a4aece62550483941ce48d50d590239647e292d01ed91e9445c85f21f6d234e645dbf8e59b62669a

    • SSDEEP

      49152:eXdV944HnLTdse8o3zN+RLn36PSAwdxgn1GDaeRbTj2bAuSfSPyI:eNTrTdn8ojURji/8+2bj20pfuy

    • CrimsonRAT main payload

    • CrimsonRat

      Crimson RAT is a malware linked to a Pakistani-linked threat actor.

    • Crimsonrat family

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Modifies WinLogon for persistence

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Sets service image path in registry

    • A potential corporate email address has been identified in the URL: [email protected]

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks