General

  • Target

    fd27da88_by_Libranalysis

  • Size

    1.8MB

  • Sample

    210505-49dh39zf96

  • MD5

    fd27da880372209151379289b0e57d11

  • SHA1

    9d9236804d7a0574ebff234bec1bea519497c27f

  • SHA256

    9a825ee20f777192913e6c02d8038cdb34907bbcfdec074f664516668f7d1339

  • SHA512

    d69b43d30cefdf0255c96763f1e53469ff3c0b1dada711b606959616e7af0608fd4cdc6e4b86b2cf174fb856e6ab01f089d6bf295217f6966c8b2576b34c338d

Malware Config

Targets

    • Target

      fd27da88_by_Libranalysis

    • Size

      1.8MB

    • MD5

      fd27da880372209151379289b0e57d11

    • SHA1

      9d9236804d7a0574ebff234bec1bea519497c27f

    • SHA256

      9a825ee20f777192913e6c02d8038cdb34907bbcfdec074f664516668f7d1339

    • SHA512

      d69b43d30cefdf0255c96763f1e53469ff3c0b1dada711b606959616e7af0608fd4cdc6e4b86b2cf174fb856e6ab01f089d6bf295217f6966c8b2576b34c338d

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

4
T1112

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Tasks