Currently viewing ATT&CK v8.2 which was live between October 27, 2020 and April 28, 2021. Learn more about the versioning system or see the live site.

Crimson

Crimson is malware used as part of a campaign known as Operation Transparent Tribe that targeted Indian diplomatic and military victims. [1]

ID: S0115
Associated Software: MSIL/Crimson
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 31 May 2017
Last Modified: 30 March 2020

Techniques Used

Domain ID Name Use
Enterprise T1555 .003 Credentials from Password Stores: Credentials from Web Browsers

Crimson contains a module to steal credentials from Web browsers on the victim machine.[1]

Enterprise T1025 Data from Removable Media

Crimson contains a module to collect data from removable drives.[1]

Enterprise T1114 .001 Email Collection: Local Email Collection

Crimson contains a command to collect and exfiltrate emails from Outlook.[1]

Enterprise T1083 File and Directory Discovery

Crimson contains commands to list files and directories, as well as search for files matching certain extensions from a defined list.[1]

Enterprise T1105 Ingress Tool Transfer

Crimson contains a command to retrieve files from its C2 server.[1]

Enterprise T1095 Non-Application Layer Protocol

Crimson uses a custom TCP protocol for C2.[1]

Enterprise T1057 Process Discovery

Crimson contains a command to list processes.[1]

Enterprise T1113 Screen Capture

Crimson contains a command to perform screen captures.[1]

Enterprise T1518 .001 Software Discovery: Security Software Discovery

Crimson contains a command to collect information about anti-virus software on the victim.[1]

Enterprise T1082 System Information Discovery

Crimson contains a command to collect the victim PC name and operating system.[1]

Enterprise T1016 System Network Configuration Discovery

Crimson contains a command to collect the victim MAC address and LAN IP.[1]

References