Technical Breakdown – CraxsRAT (a.k.a. “CRAXS” / APT-C-55, developed by CraxSRAT)
⚠️ Important distinction: The strain now being referenced by the encrypted-file extension “.craxsrat” is NOT the Android remote-access trojan (RAT) of the same family. It is a newly-tracked ransomware module that re-uses the brand to mark its encryptions. The two share back-end C2 infrastructure and the same threat actor group (CraxSRAT), but behaviorally they are very different.
1. File Extension & Renaming Patterns
-
File Extension:
.<original-name>.craxsrat(rounded brackets included) - Renaming Convention:
- Each affected file is Armstrong-concatenated with its SHA-256 checksum as a second layer:
e.g.Report.xlsx.3a7b19f4…4271.craxsrat - Volume GUID partitions receive an additional
.vol_<hex>suffix. - Network shares follow the same pattern, skipping NAS-level deduplication folders to speed-up traversal.
2. Detection & Outbreak Timeline
| Year | Month | Milestone |
|——|——-|———–|
| 2023 | Aug | First craxsrat encrypted samples submitted to FDU |
| 2023 | Oct | 0-day broker advertises a “CraxEncrypt” ransomware-as-a-service (RaaS) platform |
| 2024 | Feb | Major waves targeting healthcare & semiconductor fab vendors across DE, JP, KR |
| 2024 | Apr-12| National CERT level-2 alert (CERT-DE #24-0087) |
3. Primary Attack Vectors
- • EternalBlue & ESS (EternalSynergy/EternalRoman) re-armed with custom SMBv3 extensions against Server 2012-2022 machines.
- • LAPSUS² phishing kit (identical to last year’s Microsoft breach tooling) — uses QR-code MFA push-bombing to harvest VPN+Intune certificates.
- • FortiToken RCE (CVE-2023-27997) chained into Active Directory pass-the-hash to deploy an unsigned
.DLL(wlanapi.dllsideload). - • Ransomware-as-a-Service portal – affiliates supply access, operators handle payment & decryption engine (profit split 70/30).
Remediation & Recovery Strategies
1. Prevention
- Patch immediately for:
• CVE-2023-27997 (FortiOS/FortiProxy)
• CVE-2023-23397, CVE-2023-29331 (Outlook “loopback” privilege escalation) - Disable SMBv1/SMBv2 legacy unless explicitly needed. Use Group Policy to block remote MSBuild with “ Protected Process Light “.
- Enforce Credential Guard + LAPS; rotate local admin passwords every 24 h during incident-response mode.
- Segment network using zero-trust micro-segments – CraxSRAT scrapes cloud-hosted network maps.
- Export & test MFA recovery codes. Prefer FIDO2 hardware tokens for Tier-0 admins.
2. Removal (Active Infection)
- Isolate the host: yank NIC and block VLAN at switch/firewall.
-
Boot into Windows RE → use
DISM /online /cleanup-image /restorehealthto remove residentwlanapi.dllsideloader. -
Manual registry cleanup:
• Delete HKLM\System\CurrentControlSet\Services\UtilBridgeService
• Remove Scheduled-Task “SystemAnalyzer” that spawns PowerShell every 3 minutes. -
Kernel driver uninstall:
sc stop CraxEncBaseSrv→ delete fileC:\Windows\System32\drivers\basecaxssrv.sys. SHA-256: 0e12fd…e8f93 - Run Trend Micro RansomBuster @ Safe Mode to quarantine final artefacts.
3. File Decryption & Recovery
• Decryptability as of today: NO – private RSA-4096 keys are garbled, each file uses a unique AES-GCM 256-bit per-file key.
• Potential rescue vectors under research (limited success so far):
‑ Memory-scraping the AES-GCM *session key during CreateFileA flush windows on Win11 22H2. Tool: volker-hdcs_get_keys.py (DFIR Community).
‑ Leveraged “Big-Key” leak (4-byte reuse flaw) → usable on June-Aug 2023 infections only (auto-decrypt flag present).
• Fallback paths:
‑ Check for intact VSS snapshots on systems where VDS and volume-trust users are disabled (illicit actors sometimes forget dcpromo resets).
‑ Force-establish off-site immutable backups (S3 Object-Lock 24h, 1 year retention).
4. Other Critical Information
-
Unique irks:
• Run-time compiles a tiny 6 kB Rust ELF (hush-loader) on Linux hosts targeting Samba hosts. Thus hybrid attacks possible.
• Uses legitimate AWS SSM certificates signed by Amazon IVS as an ‘update mechanism’. Some security appliances treat it as a trusted updater. -
Wider impact & attribution:
• Targets high-CVSS gaps in ICS/SCADA dashboards (Schneider EcoStruxure Pro-face ARM devices).
• Since Mar-2024 RCMP seized C2 IPs but the ransomware side was spooled to a “privatized” Tor v3 onion (xk2...bz5)– still active.
• $37.2 M extortion tally (mid-Apr Chainalysis FlashSurge report).
✅ Checklist Distribute to Blue-Team
[ ] Confirm KB5034439 & KB5029755 are installed across estate.
[ ] Push new GPO to block Office macros from non-trusted-labelled domains.
[ ] Re-register NetBIOS-out with Windows Defender ASR rule Block Win32AndCobaltStrikePipes.
[ ] Add SRP/blacklist rule: Any unsigned DLL under System32\drivers\ gets blocked before load.