Resubmissions

07-01-2025 22:00

250107-1wz1yazrht 7

07-01-2025 21:58

250107-1vhp9ssnaq 7

07-01-2025 14:57

250107-sbtdnawkb1 10

General

  • Target

    Innovarteks-setup 1.0.exe

  • Size

    143.5MB

  • Sample

    250107-sbtdnawkb1

  • MD5

    87c8b487c3903bbc37ba9533680630c5

  • SHA1

    743d43f1d007f06de961b10ed29d861574008ffa

  • SHA256

    be1e902f9a7d42b9f38f93a96f877f4a206a823f64a6bf00f343d9cd00b981ad

  • SHA512

    5ac443a52d0d7780c6bb3831f75579fc8310629f8a906274c3d1b40d955cada2469f7f6723c4be4e8cdaa5feecafcfc34d4b0a3a5a5a6a3439854117c767d02d

  • SSDEEP

    3145728:qP+bSC++4uDXW4HTx+3MEwy+E9MPWzJUrYX5M3gbcKCXoOE23QtlV:W+2CauDXWz8eJ9LzJaYE2C6z

Malware Config

Extracted

Family

crimsonrat

C2

185.136.161.124

Targets

    • Target

      Innovarteks-setup 1.0.exe

    • Size

      143.5MB

    • MD5

      87c8b487c3903bbc37ba9533680630c5

    • SHA1

      743d43f1d007f06de961b10ed29d861574008ffa

    • SHA256

      be1e902f9a7d42b9f38f93a96f877f4a206a823f64a6bf00f343d9cd00b981ad

    • SHA512

      5ac443a52d0d7780c6bb3831f75579fc8310629f8a906274c3d1b40d955cada2469f7f6723c4be4e8cdaa5feecafcfc34d4b0a3a5a5a6a3439854117c767d02d

    • SSDEEP

      3145728:qP+bSC++4uDXW4HTx+3MEwy+E9MPWzJUrYX5M3gbcKCXoOE23QtlV:W+2CauDXWz8eJ9LzJaYE2C6z

    • CrimsonRAT main payload

    • CrimsonRat

      Crimson RAT is a malware linked to a Pakistani-linked threat actor.

    • Crimsonrat family

    • Darkcomet

      DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

    • Darkcomet family

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • Modifies WinLogon for persistence

    • Modiloader family

    • ModiLoader First Stage

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Office macro that triggers on suspicious action

      Office document macro which triggers in special circumstances - often malicious.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks