General

  • Target

    MANAGER.icns

  • Size

    18KB

  • Sample

    250107-197yps1pav

  • MD5

    89cb162b4039b50ffe94ed6b9a53091e

  • SHA1

    2e57314c0c54f603cf14174e69c4c0290475131f

  • SHA256

    aac33c5a4fe15b0f450b07c2a2f063a9602e187c4bf469c72e1d6bd15b759bd5

  • SHA512

    6ee871370725d9737f60a900bf72f899d92726eaf8887c850d42a6766754efd4ec491c6ec81b9b2cbc381e9575989bce4e8242d4da8a0b9ba72659e379068349

  • SSDEEP

    384:nlkpztbqXKqS51cSWzOGsHcFM+Wwtb2Jh+hif3DbV:l4ztbqXKqS5OIGVqXL+hif3PV

Malware Config

Extracted

Family

crimsonrat

C2

185.136.161.124

Targets

    • Target

      MANAGER.icns

    • Size

      18KB

    • MD5

      89cb162b4039b50ffe94ed6b9a53091e

    • SHA1

      2e57314c0c54f603cf14174e69c4c0290475131f

    • SHA256

      aac33c5a4fe15b0f450b07c2a2f063a9602e187c4bf469c72e1d6bd15b759bd5

    • SHA512

      6ee871370725d9737f60a900bf72f899d92726eaf8887c850d42a6766754efd4ec491c6ec81b9b2cbc381e9575989bce4e8242d4da8a0b9ba72659e379068349

    • SSDEEP

      384:nlkpztbqXKqS51cSWzOGsHcFM+Wwtb2Jh+hif3DbV:l4ztbqXKqS5OIGVqXL+hif3PV

    • CrimsonRAT main payload

    • CrimsonRat

      Crimson RAT is a malware linked to a Pakistani-linked threat actor.

    • Crimsonrat family

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • Detected microsoft outlook phishing page

    • Modifies WinLogon for persistence

    • Downloads MZ/PE file

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • System Binary Proxy Execution: Verclsid

      Adversaries may abuse Verclsid to proxy execution of malicious code.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks