URLhaus Database

URLhaus tries to identify the malware associated with the payload served by a certain malware URL. In case URLhaus is able to identify the associated malware family, the payload will be tagged accordingly (field signature). The page below gives you an overview on payloads that URLhaus has identified as CrimsonRAT.

Database Entry


Signature:CrimsonRAT
Firstseen:2020-05-20 12:06:05 UTC
Lastseen:2020-08-24 11:49:50 UTC
Unique Payloads:4
URLs:4

Payload


The table below shows all payloads that have been identified as CrimsonRAT.

Firstseen (UTC)SHA256File TypeFile sizeVT
2020-08-24 11:49:50a8f02b8afe1ae18247c52d2e7272de680c81e7f215c5302d9c0961ff3ad52cb9Executable exe1'308'672Virustotal results 43 / 70 (61.43)
2020-08-18 15:16:19a8f02b8afe1ae18247c52d2e7272de680c81e7f215c5302d9c0961ff3ad52cb9Executable exe1'308'672n/a
2020-05-26 09:28:3272146e890efa1de6ee90e445ceb11ad9dc3b053fa5e82757756a393ee4617a77Executable exe254'976Virustotal results 10 / 68 (14.71)
2020-05-20 12:06:058ad2241815c24934b523082e603316065818decfe0d4897d4a6dee84626c5dfaExecutable exe1'430'528Virustotal results 16 / 73 (21.92)

Number of entries displayed: 4 (max: 1'000)