MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



CrimsonRAT


Vendor detections: 8


Maldoc score: 23


Intelligence 8 IOCs YARA 11 File information Comments

SHA256 hash: e38c39e302de158d22e8d0ba9cd6cc9368817bc611418a5777d00b90a9341404
SHA3-384 hash: 049b86f4a43bae174729326938b850fe39b4809263a5755b457fcf0b484b81744ab05da465543464f8d07b9bbbef2149
SHA1 hash: b67712125dce3f8b5d197fcc46aaf627da2fb7eb
MD5 hash: 22ce9042f6f78202c6c346cef1b6e532
humanhash: washington-quebec-tango-pluto
File name:5.docm
Download: download sample
Signature CrimsonRAT
File size:4'779'017 bytes
First seen:2023-10-09 09:11:12 UTC
Last seen:Never
File type:Word file docm
MIME type:application/octet-stream
ssdeep 98304:JWnSXYZsDL1nxNUQfbqKh1nshu8JOH0sLbl9t0/ZwiwrYSMlGortsUDIS7JuLYsa:0niUs39sQeK8uY+Jl9MZwdrDMlGorts2
TLSH T1382633B49DFED2B0B33D01F6D5FA5B12B14809A4CEAAD4A777D913F4848680EE2161D3
TrID 53.0% (.DOCM) Word Microsoft Office Open XML Format document (with Macro) (52000/1/9)
23.9% (.DOCX) Word Microsoft Office Open XML Format document (23500/1/4)
17.8% (.ZIP) Open Packaging Conventions container (17500/1/4)
4.0% (.ZIP) ZIP compressed archive (4000/1)
1.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter smica83
Tags:apt CrimsonRAT docm TransparentTribe

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 23
OLE dump

MalwareBazaar was able to identify 11 sections in this file using oledump:

Section IDSection sizeSection name
A1493 bytesPROJECT
A271 bytesPROJECTwm
A31052 bytesVBA/NewMacros
A45502 bytesVBA/ThisDocument
A53591 bytesVBA/_VBA_PROJECT
A61088 bytesVBA/__SRP_0
A770 bytesVBA/__SRP_1
A884 bytesVBA/__SRP_2
A9103 bytesVBA/__SRP_3
A10578 bytesVBA/dir
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecDocument_NewRuns when a new Word document is created
AutoExecDocument_OpenRuns when the Word or Publisher document is opened
AutoExecDocument_ContentContRuns when the file is opened and ActiveX objects trigger events
SuspiciousEnvironMay read system environment variables
SuspiciousOpenMay open a file
SuspiciousCopyFileMay copy a file
SuspiciousCopyHereMay copy a file
SuspiciousShellMay run an executable file or a system command
SuspiciousvbNormalNoFocusMay run an executable file or a system command
SuspiciousMkDirMay create a directory
SuspiciousCreateObjectMay create an OLE object
SuspiciousShell.ApplicationMay run an application (if combined with CreateObject)
SuspiciousSystemMay run an executable file or a system command on a Mac (if combined with libc.dylib)

Intelligence


File Origin
# of uploads :
1
# of downloads :
299
Origin country :
HU HU
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Searching for the window
Creating a window
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
evasive macros macros-on-open masquerade phishing
Verdict:
Malicious
Labled as:
Trojan.Generic.34206153;VB:Trojan.Valyria
Result
Threat name:
Crimson
Detection:
malicious
Classification:
troj.expl.evad
Score:
100 / 100
Signature
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Connects to many ports of the same IP (likely port scanning)
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro which might access itself as a file (possible anti-VM)
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with functions possibly related to ADO stream file operations
Document contains VBA stomped code (only p-code) potentially bypassing AV detection
Document exploit detected (drops PE files)
Document exploit detected (process start blacklist hit)
Machine Learning detection for sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Office process drops PE file
Yara detected Crimson RAT
Behaviour
Behavior Graph:
Threat name:
Win32.Trojan.Valyria
Status:
Malicious
First seen:
2023-10-03 11:04:41 UTC
File Type:
Document
Extracted files:
131
AV detection:
17 of 36 (47.22%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address
Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:maldoc_getEIP_method_1
Author:Didier Stevens (https://DidierStevens.com)
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:meth_get_eip
Author:Willi Ballenthin
Rule name:office_document_vba
Author:Jean-Philippe Teissier / @Jipe_
Description:Office document with embedded VBA
Reference:https://github.com/jipegit/
Rule name:PE_Digital_Certificate
Author:albertzsigovits
Rule name:pe_no_import_table
Author:qux
Description:Detects exe does not have import table
Rule name:vbaproject_bin
Author:CD_R0M_
Description:{76 62 61 50 72 6f 6a 65 63 74 2e 62 69 6e} is hex for vbaproject.bin. Macros are often used by threat actors. Work in progress - Ran out of time

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments