General

  • Target

    ea6c8dedae18debbaa594ff90a981ee46a1b20b31bcba4c52cf62c9a0d7ddd54

  • Size

    1.2MB

  • Sample

    210515-a28a5ebfwj

  • MD5

    b88a11a6297608f72d404742980c5a47

  • SHA1

    90e248e1fb37e066431501c33b429fd2c180f157

  • SHA256

    ea6c8dedae18debbaa594ff90a981ee46a1b20b31bcba4c52cf62c9a0d7ddd54

  • SHA512

    974bed3778a4f58a06bf29d49c30ed18ffa5cddb343e8928ebe8b94d16e2dbc812a20e7d385593a73847f4cd64d03bb40fd369ba167357045a189bf6c1d0f814

Malware Config

Targets

    • Target

      ea6c8dedae18debbaa594ff90a981ee46a1b20b31bcba4c52cf62c9a0d7ddd54

    • Size

      1.2MB

    • MD5

      b88a11a6297608f72d404742980c5a47

    • SHA1

      90e248e1fb37e066431501c33b429fd2c180f157

    • SHA256

      ea6c8dedae18debbaa594ff90a981ee46a1b20b31bcba4c52cf62c9a0d7ddd54

    • SHA512

      974bed3778a4f58a06bf29d49c30ed18ffa5cddb343e8928ebe8b94d16e2dbc812a20e7d385593a73847f4cd64d03bb40fd369ba167357045a189bf6c1d0f814

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks