| File name: | CraxsRatV6.7.rar |
| Full analysis: | https://app.any.run/tasks/1a908b20-defe-4ce6-b30b-a8a0f75ee3d4 |
| Verdict: | Malicious activity |
| Threats: | Blank Grabber is an infostealer written in Python. It is designed to steal a wide array of data, such as browser login credentials, crypto wallets, Telegram sessions, and Discord tokens. It is an open-source malware, with its code available on GitHub and regularly receiving updates. Blank Grabber builder’s simple interface lets threat actors even with basic skills to deploy it and conduct attacks. |
| Analysis date: | May 27, 2024, 09:23:35 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | 4B69081A9CDA05D04CB136BBE3A7B6EB |
| SHA1: | FBC6F19E1285F1E664809D890574CB7D47E59BB8 |
| SHA256: | AAEEBEABC0B7692D3ED3DFB5E6EFB8966C87D89C5B32617EBA72829D9174C26A |
| SSDEEP: | 393216:e7kiZLkQS9SeTzPzdN9UWLI+u/FvZfYv3ehVeNeE77ZVi3ZJpJouLHAQMjdMKj9X:cWBZ51u9WvOhV/EZg6uLgRMeqlC3 |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 72 | tasklist /FO LIST | C:\Windows\System32\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1008 | wmic computersystem get totalphysicalmemory | C:\Windows\System32\wbem\WMIC.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: WMI Commandline Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1100 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\admin\AppData\Local\Temp\hfnk4vx0\hfnk4vx0.cmdline" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Visual C# Command Line Compiler Exit code: 0 Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| 1120 | powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ .scr' | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1176 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1204 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1208 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1728 | attrib +h +s "C:\Users\admin\AppData\Local\Temp\Rar$EXa6532.16118\CraxsRat VIP\CraxsRat VIP\CraxsRat.exe" | C:\Windows\System32\attrib.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Attribute Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1728 | systeminfo | C:\Windows\System32\systeminfo.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Displays system information Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1752 | C:\WINDOWS\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory" | C:\Windows\System32\cmd.exe | — | CraxsRat.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (6532) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (6532) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (6532) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\GoogleChromeEnterpriseBundle64.zip | |||
| (PID) Process: | (6532) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\CraxsRatV6.7.rar | |||
| (PID) Process: | (6532) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (6532) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (6532) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (6532) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (6532) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (6532) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6532 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6532.16118\CraxsRat VIP\CraxsRat VIP\CraxsRat.exe | — | |
MD5:— | SHA256:— | |||
| 6532 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6532.16118\CraxsRat VIP\CraxsRat VIP\DrakeUI.Framework.dll | executable | |
MD5:0562B4C97F643306DF491A938AE636DA | SHA256:70E72477F7FE0018E043CE8FE2228A289459058EE41CAECD6F05855898BC5B80 | |||
| 6532 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6532.16118\CraxsRat VIP\CraxsRat VIP\LiveCharts.dll | executable | |
MD5:9642899636959B7FC89BF34A8B998A90 | SHA256:9FCF89837B60F69C1C501E4CFA4D2860887AFD0B8F325803367E795A4E3BC9CA | |||
| 6532 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6532.16118\CraxsRat VIP\CraxsRat VIP\ChangeLog.html | text | |
MD5:68BE5F2305D89845AE9C4E81E5B493EF | SHA256:6B7FECCC3C61F99C5DB7890187C9564BE846253A09FEE88B599B7D7EC14F9713 | |||
| 6532 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6532.16118\CraxsRat VIP\CraxsRat VIP\LiveCharts.WinForms.dll | executable | |
MD5:76C775D09B24798F6923452E920979B5 | SHA256:A5B61C1726304E6B72E09A0F35DDBF52F89A75A4E28E6ED098C8D1DF6081B4AD | |||
| 6532 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6532.16118\CraxsRat VIP\CraxsRat VIP\CraxsRat.pdb | binary | |
MD5:87478F5BB8A27502D0F6AC9C20CB9CD4 | SHA256:788DEEA15DE834AE17223B374A896EF3A3E848E2B4CD6E9FDC456747861C460E | |||
| 6532 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6532.16118\CraxsRat VIP\CraxsRat VIP\Errorlogs.txt | text | |
MD5:8FE4B6ABB11E41CA939AF1BFEDF93226 | SHA256:AB18414DDE41BC4662FCF05F01EE83FC8CDF48CA1D31E149DBAC3E7C8EF1565B | |||
| 6532 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6532.16118\CraxsRat VIP\CraxsRat VIP\CraxsRat.xml | xml | |
MD5:20D9FE07B999EE8A2A161CAF409091BE | SHA256:7F0D970F59B74CE707AA9A3E9695B8889560201D1A2C94D1C8298E32643EBE67 | |||
| 6532 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6532.16118\CraxsRat VIP\CraxsRat VIP\GeoIPCitys.dll | executable | |
MD5:C070F2421851420E832E4F5989A775A2 | SHA256:D54FD6C5903EEA49A75D620D4BA232F8EFFB1863F5F9C974E4AC0A8FB1904131 | |||
| 6532 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXa6532.16118\CraxsRat VIP\CraxsRat VIP\LiveCharts.WinForms.xml | xml | |
MD5:32FB534A5D1468039AB63333C336D841 | SHA256:A39D20B8553196315005A790D0CEE6636E123744B67EE5DA88C8CC61A05919DB | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5228 | svchost.exe | GET | 200 | 2.20.68.220:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | unknown |
5140 | MoUsoCoreWorker.exe | GET | 200 | 2.20.68.220:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | unknown |
— | — | GET | 200 | 2.17.245.133:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | unknown |
— | — | GET | 200 | 2.20.68.220:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | unknown |
5228 | svchost.exe | GET | — | 2.17.245.133:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | unknown |
4752 | CraxsRat.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json/?fields=225545 | unknown | — | — | unknown |
5140 | MoUsoCoreWorker.exe | GET | 200 | 2.17.245.133:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | unknown |
— | — | GET | 204 | 142.250.184.227:443 | https://gstatic.com/generate_204 | unknown | — | — | — |
2908 | OfficeClickToRun.exe | POST | — | 52.182.143.214:443 | https://self.events.data.microsoft.com/OneCollector/1.0/ | unknown | — | — | — |
4752 | CraxsRat.exe | POST | 404 | 162.159.136.232:443 | https://discord.com/api/webhooks/1193297764734480404/KUzaY4KCWj1VFSHjqDcOcwuGOmHzx9c2YCWgq2T7_qupTk0xmZu3ZEcRqwiXXKSMtMv1 | unknown | binary | 45 b | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 239.255.255.250:1900 | — | — | — | unknown |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | unknown |
5228 | svchost.exe | 2.20.68.220:80 | crl.microsoft.com | Telkom-Internet | ZA | unknown |
— | — | 2.20.68.220:80 | crl.microsoft.com | Telkom-Internet | ZA | unknown |
5140 | MoUsoCoreWorker.exe | 2.20.68.220:80 | crl.microsoft.com | Telkom-Internet | ZA | unknown |
— | — | 2.17.245.133:80 | www.microsoft.com | Akamai International B.V. | NL | unknown |
5228 | svchost.exe | 2.17.245.133:80 | www.microsoft.com | Akamai International B.V. | NL | unknown |
5140 | MoUsoCoreWorker.exe | 2.17.245.133:80 | www.microsoft.com | Akamai International B.V. | NL | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
gstatic.com |
| whitelisted |
ip-api.com |
| shared |
discord.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2184 | svchost.exe | Misc activity | ET INFO Observed Discord Domain in DNS Lookup (discord .com) |
4752 | CraxsRat.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup ip-api.com |
4752 | CraxsRat.exe | A Network Trojan was detected | STEALER [ANY.RUN] BlankGrabber (SkochGrabber) Generic External IP Check |
4752 | CraxsRat.exe | Misc activity | ET INFO Observed Discord Domain (discord .com in TLS SNI) |