General
-
Target
CraxsRat.exe
-
Size
74KB
-
Sample
241226-zdmr8aypaz
-
MD5
4ede52da0203635e6710c5c2d342e9a2
-
SHA1
85543afb17c7b8d5372e37fe436f8f1713535496
-
SHA256
407811722d5d33124ac105789ae08fc00e50173292d90766b633babfa8243a05
-
SHA512
d01509d737f6b6d4af14747bb8dc58f7225b91b6ca94204b9cae6ec30f8d4b7cfb944702da622cb1e4ede7aca20cb9c3adccb73b46144abe7676ae370e944f1d
-
SSDEEP
768:CXnupU7ZFwUkBZq+OjCoPPupelf8/F1xlM5U+sarzcoODlXhwRyfIY63hGukQ7zp:8uBBZzOjOpGf893wE5h4yfIeYlww
Static task
static1
Behavioral task
behavioral1
Sample
CraxsRat.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
xworm
szqdzaa-22376.portmap.host:22376
-
Install_directory
%AppData%
-
install_file
SecurityHealthSystray.exe
-
telegram
https://api.telegram.org/bot6452802278:AAHjSHCysYxHacEO8AgYopBedWCYBDBhX5I/sendMessage?chat_id=5355197127
Extracted
gurcu
https://api.telegram.org/bot6452802278:AAHjSHCysYxHacEO8AgYopBedWCYBDBhX5I/sendMessage?chat_id=5355197127
Targets
-
-
Target
CraxsRat.exe
-
Size
74KB
-
MD5
4ede52da0203635e6710c5c2d342e9a2
-
SHA1
85543afb17c7b8d5372e37fe436f8f1713535496
-
SHA256
407811722d5d33124ac105789ae08fc00e50173292d90766b633babfa8243a05
-
SHA512
d01509d737f6b6d4af14747bb8dc58f7225b91b6ca94204b9cae6ec30f8d4b7cfb944702da622cb1e4ede7aca20cb9c3adccb73b46144abe7676ae370e944f1d
-
SSDEEP
768:CXnupU7ZFwUkBZq+OjCoPPupelf8/F1xlM5U+sarzcoODlXhwRyfIY63hGukQ7zp:8uBBZzOjOpGf893wE5h4yfIeYlww
-
Detect Xworm Payload
-
Gurcu family
-
StormKitty payload
-
Stormkitty family
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1