General
-
Target
sample
-
Size
53KB
-
Sample
250129-lzhthavlgy
-
MD5
0fe5d379ba13ffbe79071ee5050d433f
-
SHA1
9f6b75eeab43c7545106f7c34dcf451e1544cc32
-
SHA256
a77b46a19d7c96601d5baa05d9b0091f6eafa696b5871fdfe3d7c61aa9722b3a
-
SHA512
ade927d4f63d93abd0adc802f224e3d54072394312da0fff493bffe3c377931ca4473372582ee5e616b041612e0e27dd801777b9ec5036811b6283e62ddf71cc
-
SSDEEP
1536:q69UFuCHuZpMoKHQqWSkjp2EAcSgNRI6ZsnJVrQ5Ya0S6V/9hTl67Q4sclW+CSS/:V9UFuL3MoKHQqWSkjp2EAcSgNRI6Zsnz
Static task
static1
Behavioral task
behavioral1
Sample
sample.js
Resource
win10ltsc2021-20250128-en
Malware Config
Extracted
crimsonrat
185.136.161.124
Targets
-
-
Target
sample
-
Size
53KB
-
MD5
0fe5d379ba13ffbe79071ee5050d433f
-
SHA1
9f6b75eeab43c7545106f7c34dcf451e1544cc32
-
SHA256
a77b46a19d7c96601d5baa05d9b0091f6eafa696b5871fdfe3d7c61aa9722b3a
-
SHA512
ade927d4f63d93abd0adc802f224e3d54072394312da0fff493bffe3c377931ca4473372582ee5e616b041612e0e27dd801777b9ec5036811b6283e62ddf71cc
-
SSDEEP
1536:q69UFuCHuZpMoKHQqWSkjp2EAcSgNRI6ZsnJVrQ5Ya0S6V/9hTl67Q4sclW+CSS/:V9UFuL3MoKHQqWSkjp2EAcSgNRI6Zsnz
-
CrimsonRAT main payload
-
Crimsonrat family
-
Modifies WinLogon for persistence
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Event Triggered Execution: Image File Execution Options Injection
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks whether UAC is enabled
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2JavaScript
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
4Pre-OS Boot
1Bootkit
1Subvert Trust Controls
2Install Root Certificate
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
5Discovery
Browser Information Discovery
1Query Registry
12System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
5