General

  • Target

    e3470ce6f6ecafdd10bf56976977e1d609d237dd4861cbe9ebf262139bdda688

  • Size

    2.9MB

  • Sample

    210228-4rq2lwwj3s

  • MD5

    bf062cc0741768fb687eef022514058f

  • SHA1

    3fbeacad73efb2aaf67ee363b6b78555e179b776

  • SHA256

    e3470ce6f6ecafdd10bf56976977e1d609d237dd4861cbe9ebf262139bdda688

  • SHA512

    e177a686d34318559502086202aa35d3e630504717d2b34a6637ae05f9061ce66d164864fc23c354f33ca1585b525260137652c1cc530076921d7930d8b606a3

Malware Config

Targets

    • Target

      e3470ce6f6ecafdd10bf56976977e1d609d237dd4861cbe9ebf262139bdda688

    • Size

      2.9MB

    • MD5

      bf062cc0741768fb687eef022514058f

    • SHA1

      3fbeacad73efb2aaf67ee363b6b78555e179b776

    • SHA256

      e3470ce6f6ecafdd10bf56976977e1d609d237dd4861cbe9ebf262139bdda688

    • SHA512

      e177a686d34318559502086202aa35d3e630504717d2b34a6637ae05f9061ce66d164864fc23c354f33ca1585b525260137652c1cc530076921d7930d8b606a3

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • Warzone RAT Payload

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Drops startup file

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

4
T1112

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Tasks