General

  • Target

    run.bat

  • Size

    5.0MB

  • Sample

    250201-qnq3ystncv

  • MD5

    68b7f8d79fe5e34157caab1f633355a2

  • SHA1

    189ee5a993510eda4138b3f2cd1e53100e6a4f0e

  • SHA256

    661dc65d02dc8b717befa8996eeb02cb0445094440693423dfb2da9ab16cf41b

  • SHA512

    8e1e8304cfb0963a159ab82aff39e21584e832c7224405e61140698ec578a35146ea12178bd4d7b2676a8980359097d2ab2aa70a0f83195729ae7cae48a41f02

  • SSDEEP

    48:1JJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJl:n

Malware Config

Extracted

Family

crimsonrat

C2

185.136.161.124

Targets

    • Target

      run.bat

    • Size

      5.0MB

    • MD5

      68b7f8d79fe5e34157caab1f633355a2

    • SHA1

      189ee5a993510eda4138b3f2cd1e53100e6a4f0e

    • SHA256

      661dc65d02dc8b717befa8996eeb02cb0445094440693423dfb2da9ab16cf41b

    • SHA512

      8e1e8304cfb0963a159ab82aff39e21584e832c7224405e61140698ec578a35146ea12178bd4d7b2676a8980359097d2ab2aa70a0f83195729ae7cae48a41f02

    • SSDEEP

      48:1JJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJJl:n

    • CrimsonRAT main payload

    • CrimsonRat

      Crimson RAT is a malware linked to a Pakistani-linked threat actor.

    • Crimsonrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Office macro that triggers on suspicious action

      Office document macro which triggers in special circumstances - often malicious.

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Network Share Discovery

      Attempt to gather information on host network.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks