General
-
Target
SpeedAutoClicker.exe
-
Size
2.1MB
-
Sample
250401-wnzb8atsgt
-
MD5
b3a2e60b9cf66a908fbc22fec9a5f398
-
SHA1
7e8bc7e0e0c7de380e1b5d6565bd9258317e80f5
-
SHA256
6bc32e935a514da31e6ed5559252c36d82fd64b1e6403748b0ba86598ef20071
-
SHA512
293a9a8d6df97fa90d3abe6c756d7c063e0ee80c8f71f7f16bb6793a8d84c5781307e9bb93dca267f6aade2a39a120b9fa00e7c8f7e41bd6cdecf16adad3e697
-
SSDEEP
49152:ypJWi2J3Y2ptHEAz+axysYC6syUkoPaPS2AJNyxUP+MkZBF:22Jo2rytClVkoOSfJNAUWJ
Static task
static1
Behavioral task
behavioral1
Sample
SpeedAutoClicker.exe
Resource
win10ltsc2021-20250314-en
Malware Config
Extracted
metasploit
windows/download_exec
http://149.129.72.37:23456/SNpK
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; NP09; NP09; MAAU)
Extracted
crimsonrat
185.136.161.124
Targets
-
-
Target
SpeedAutoClicker.exe
-
Size
2.1MB
-
MD5
b3a2e60b9cf66a908fbc22fec9a5f398
-
SHA1
7e8bc7e0e0c7de380e1b5d6565bd9258317e80f5
-
SHA256
6bc32e935a514da31e6ed5559252c36d82fd64b1e6403748b0ba86598ef20071
-
SHA512
293a9a8d6df97fa90d3abe6c756d7c063e0ee80c8f71f7f16bb6793a8d84c5781307e9bb93dca267f6aade2a39a120b9fa00e7c8f7e41bd6cdecf16adad3e697
-
SSDEEP
49152:ypJWi2J3Y2ptHEAz+axysYC6syUkoPaPS2AJNyxUP+MkZBF:22Jo2rytClVkoOSfJNAUWJ
-
CrimsonRAT main payload
-
Crimsonrat family
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-