Crimson Rat

Malware updated 4 months ago (2024-05-04T17:54:17.102Z)
Download STIX
Preview STIX
Crimson RAT is a malicious software, or malware, primarily used by the threat actor known as APT36 or Transparent Tribe. This custom .NET Remote Access Trojan (RAT) has been observed in multiple instances of cyber-attacks, mainly targeting India and Afghanistan. Over time, alongside Crimson RAT, Transparent Tribe has also employed other custom .NET malware and a Python-based RAT named Peppy. Notably, some variants of Crimson RAT have been identified using cracked versions of a commercial obfuscation tool, Eazfuscator, to disguise their code. The malware can infiltrate systems through suspicious downloads, emails, or websites and once inside, it is capable of exfiltrating system information, capturing screenshots, starting and stopping processes, and enumerating files and drives. In April, SentinelLabs spotted an expansion of this long-running threat actor's interest into the Indian education sector, utilizing Crimson RAT through a cluster of malicious documents. These documents stage the malware using Microsoft Office macros or OLE embedding. Moreover, the names and content of these lure documents, along with the associated domains and use of Crimson RAT, suggest that these recent activities are part of a previously reported campaign by Transparent Tribe. Upon closer inspection, SentinelOne discovered that what was initially identified as Crimson RAT was actually a server-side implant used by the attackers to manage client components. This discovery highlights the evolving nature of the threat posed by Transparent Tribe. Furthermore, SentinelOne noted that Crimson RAT variants implement different obfuscation techniques of varying intensities, such as simple function name malformation and dynamic string resolution. Several Crimson RAT .NET implementations were observed with timestamps between July and September 2022, indicating ongoing activity by the threat actor.
Description last updated: 2024-03-18T16:19:24.469Z
What's your take? (Question 1 of 1)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Malware
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
IDTypeVotesProfile Description
APT36Unspecified
3
APT36, also known as Transparent Tribe and Earth Karkaddan, is a threat actor group that has historically targeted government agencies and defense firms in India with cyberattacks aimed at compromising Windows systems and Android devices. The group's activities have been tracked by various cybersecu
Source Document References
Information about the Crimson Rat Malware was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
6 months ago
12 Months of Fighting Cybercrime & Defending Enterprises | #cybercrime | #infosec | National Cyber Security Consulting
MITRE
2 years ago
Transparent Tribe: Evolution analysis, part 1 | Securelist
InfoSecurity-magazine
a year ago
Pakistan-Aligned Hackers Disrupt Indian Education Sector
BankInfoSecurity
a year ago
APT36 Running Espionage Ops Against India's Education Sector