General

  • Target

    8ac310213dc8a18fc021be40d9b756e9ee61ac2b45e0ca249feae7ec177ed5ce

  • Size

    1.8MB

  • Sample

    210505-pbxkk97cka

  • MD5

    fab3488dffbdf592f61708e6814c1ef1

  • SHA1

    94ec6b78f7949a3c5fe7c6078a5541235c53fa7c

  • SHA256

    8ac310213dc8a18fc021be40d9b756e9ee61ac2b45e0ca249feae7ec177ed5ce

  • SHA512

    c2d139ece8d85dbb78865234991a6849f137a76bd346539f38dff3b3b42be111403c9a44f23c6724a6dd1741baa69d6672b15480f4ed47d7f9886fcdf8ce6aa3

Malware Config

Targets

    • Target

      8ac310213dc8a18fc021be40d9b756e9ee61ac2b45e0ca249feae7ec177ed5ce

    • Size

      1.8MB

    • MD5

      fab3488dffbdf592f61708e6814c1ef1

    • SHA1

      94ec6b78f7949a3c5fe7c6078a5541235c53fa7c

    • SHA256

      8ac310213dc8a18fc021be40d9b756e9ee61ac2b45e0ca249feae7ec177ed5ce

    • SHA512

      c2d139ece8d85dbb78865234991a6849f137a76bd346539f38dff3b3b42be111403c9a44f23c6724a6dd1741baa69d6672b15480f4ed47d7f9886fcdf8ce6aa3

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

4
T1112

Hidden Files and Directories

1
T1158

Discovery

System Information Discovery

1
T1082

Tasks