General
-
Target
CraxsRat V4.zip
-
Size
145.2MB
-
Sample
241221-qj441szpev
-
MD5
b9f85a70824ca397dbfb2e954b1ddbe4
-
SHA1
da21276ef4b8f6e7e41edd786189dcc2b5299210
-
SHA256
f5526509fddb95bde20e9127e2319112966833a530bd3bb71bcb0298779609cf
-
SHA512
fb89f08923fc7a7b303c9d92403d0e22fbc92b5a87ac363628c7ea6574b8b7161aed62d04e2a0418cf4bc535602604d72e9f360c550ee273b8efeceed0327987
-
SSDEEP
3145728:XsrCnvC4sBcEdm7rYPJFPihoQPZbSVmtNyhj6NmiXQKAp91Wg5u35kH:Xf2CEdmviPiyQxbhchjmmiXoN5uJK
Behavioral task
behavioral1
Sample
CraxsRat V4.zip
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.zoho.com - Port:
587 - Username:
[email protected] - Password:
Nescau71#
Targets
-
-
Target
CraxsRat V4.zip
-
Size
145.2MB
-
MD5
b9f85a70824ca397dbfb2e954b1ddbe4
-
SHA1
da21276ef4b8f6e7e41edd786189dcc2b5299210
-
SHA256
f5526509fddb95bde20e9127e2319112966833a530bd3bb71bcb0298779609cf
-
SHA512
fb89f08923fc7a7b303c9d92403d0e22fbc92b5a87ac363628c7ea6574b8b7161aed62d04e2a0418cf4bc535602604d72e9f360c550ee273b8efeceed0327987
-
SSDEEP
3145728:XsrCnvC4sBcEdm7rYPJFPihoQPZbSVmtNyhj6NmiXQKAp91Wg5u35kH:Xf2CEdmviPiyQxbhchjmmiXoN5uJK
-
Hawkeye family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-