General

  • Target

    5d3de3a4a8cc6e62349bdfe5b00bb7afa50329cf68bed52e110735da4e373167

  • Size

    1.8MB

  • Sample

    210504-jbvjx7crje

  • MD5

    d6de6a5681c7cf2d282efd99c9e0086b

  • SHA1

    ba5fa98776517acf378d9c0fe4c22d821c47ffc3

  • SHA256

    5d3de3a4a8cc6e62349bdfe5b00bb7afa50329cf68bed52e110735da4e373167

  • SHA512

    d8784ff2a22bee67413f2f4eeaffd33f39e9be8ca05d24d49b5736f684d0fab57ebe86c488454fc1ecc1286128dc7559b6a9b570fdd886a5376bb61d85e9a780

Malware Config

Targets

    • Target

      5d3de3a4a8cc6e62349bdfe5b00bb7afa50329cf68bed52e110735da4e373167

    • Size

      1.8MB

    • MD5

      d6de6a5681c7cf2d282efd99c9e0086b

    • SHA1

      ba5fa98776517acf378d9c0fe4c22d821c47ffc3

    • SHA256

      5d3de3a4a8cc6e62349bdfe5b00bb7afa50329cf68bed52e110735da4e373167

    • SHA512

      d8784ff2a22bee67413f2f4eeaffd33f39e9be8ca05d24d49b5736f684d0fab57ebe86c488454fc1ecc1286128dc7559b6a9b570fdd886a5376bb61d85e9a780

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

4
T1112

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Tasks