General
-
Target
run.bat
-
Size
5.0MB
-
Sample
250201-qnq3ystncv
-
MD5
68b7f8d79fe5e34157caab1f633355a2
-
SHA1
189ee5a993510eda4138b3f2cd1e53100e6a4f0e
-
SHA256
661dc65d02dc8b717befa8996eeb02cb0445094440693423dfb2da9ab16cf41b
-
SHA512
8e1e8304cfb0963a159ab82aff39e21584e832c7224405e61140698ec578a35146ea12178bd4d7b2676a8980359097d2ab2aa70a0f83195729ae7cae48a41f02
-
SSDEEP
48:1JJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJl:n
Static task
static1
Behavioral task
behavioral1
Sample
run.bat
Resource
win11-20241007-de
Malware Config
Extracted
crimsonrat
185.136.161.124
Targets
-
-
Target
run.bat
-
Size
5.0MB
-
MD5
68b7f8d79fe5e34157caab1f633355a2
-
SHA1
189ee5a993510eda4138b3f2cd1e53100e6a4f0e
-
SHA256
661dc65d02dc8b717befa8996eeb02cb0445094440693423dfb2da9ab16cf41b
-
SHA512
8e1e8304cfb0963a159ab82aff39e21584e832c7224405e61140698ec578a35146ea12178bd4d7b2676a8980359097d2ab2aa70a0f83195729ae7cae48a41f02
-
SSDEEP
48:1JJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJl:n
-
CrimsonRAT main payload
-
Crimsonrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Legitimate hosting services abused for malware hosting/C2
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Network Share Discovery
1Query Registry
4System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
1