General
-
Target
MANAGER.icns
-
Size
18KB
-
Sample
250107-197yps1pav
-
MD5
89cb162b4039b50ffe94ed6b9a53091e
-
SHA1
2e57314c0c54f603cf14174e69c4c0290475131f
-
SHA256
aac33c5a4fe15b0f450b07c2a2f063a9602e187c4bf469c72e1d6bd15b759bd5
-
SHA512
6ee871370725d9737f60a900bf72f899d92726eaf8887c850d42a6766754efd4ec491c6ec81b9b2cbc381e9575989bce4e8242d4da8a0b9ba72659e379068349
-
SSDEEP
384:nlkpztbqXKqS51cSWzOGsHcFM+Wwtb2Jh+hif3DbV:l4ztbqXKqS5OIGVqXL+hif3PV
Static task
static1
Behavioral task
behavioral1
Sample
MANAGER.png
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
MANAGER.png
Resource
win10v2004-20241007-en
Malware Config
Extracted
crimsonrat
185.136.161.124
Targets
-
-
Target
MANAGER.icns
-
Size
18KB
-
MD5
89cb162b4039b50ffe94ed6b9a53091e
-
SHA1
2e57314c0c54f603cf14174e69c4c0290475131f
-
SHA256
aac33c5a4fe15b0f450b07c2a2f063a9602e187c4bf469c72e1d6bd15b759bd5
-
SHA512
6ee871370725d9737f60a900bf72f899d92726eaf8887c850d42a6766754efd4ec491c6ec81b9b2cbc381e9575989bce4e8242d4da8a0b9ba72659e379068349
-
SSDEEP
384:nlkpztbqXKqS51cSWzOGsHcFM+Wwtb2Jh+hif3DbV:l4ztbqXKqS5OIGVqXL+hif3PV
-
CrimsonRAT main payload
-
Crimsonrat family
-
Darkcomet family
-
Detected microsoft outlook phishing page
-
Modifies WinLogon for persistence
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
System Binary Proxy Execution: Verclsid
Adversaries may abuse Verclsid to proxy execution of malicious code.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2System Binary Proxy Execution
1Verclsid
1