Skip to main content
Skip to main content
Published Apr 05, 2019 | Updated Jan 08, 2026

Trojan:MSIL/CrimsonRAT.B

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Trojan:MSIL/CrimsonRAT.B is a sophisticated remote access Trojan (RAT) belonging to the .NET-based CrimsonRAT family, designed to provide threat actors with persistent, unauthorized remote control over compromised Windows devices. Its core purpose is cyber espionage, specializing in the stealth exfiltration of sensitive data through capabilities like screenshot capture, keystroke logging, and credential theft from web browsers. The malware is predominantly delivered through targeted spear-phishing campaigns, where emails contain malicious attachments such as documents with embedded macros or password-protected archive files (for example, RAR, IMG) to bypass initial security scans. It establishes persistence by modifying Windows Registry autorun keys and communicates with threat actor-controlled servers using a custom TCP protocol over non-standard ports. 

This threat is operationally linked to the advanced persistent threat group. This specific variant exemplifies the group's continuous development efforts to enhance evasion and functionality; forensic analysis reveals specific indicators of compromise, including dropped files with obfuscated names like railthnsrqn.exe, connections to IPs such as 167[.]160.166[.]177, and the use of fake domains mimicking legitimate applications. Its success hinges on social engineering, relying on a user's action to run the initial payload, after which it operates in the background to avoid immediate detection while siphoning data. 

  • Disconnect the machine from all networks (Ethernet and Wi-Fi) to sever C2 communication and prevent further data loss. 
  • Manually inspect and delete the malicious autorun registry keys under HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run. Also, check startup folders for suspicious shortcuts. 
  • Locate and remove dropped files in directories like C:\ProgramData\. Refer to the file names and hash provided in the Technical Analysis section. 
  • Reset passwords for all accounts accessed from the compromised devices, especially email, banking, and network logins. Assume credentials were captured. 
  • Update firewall rules to block traffic to the known malicious IP addresses and domains. 
  • For a confirmed high-severity infection, the most secure action is to back up critical user data (after scanning it) and perform a clean reinstallation of the operating system. 

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts. 

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help. 

Follow us