General

  • Target

    5d597c9d9079757dd3212b79e3092a77f100954526198a8df4fe72e47133f6c6

  • Size

    1.8MB

  • Sample

    210516-39zxfpr4ys

  • MD5

    bd446939da29c3ec6450c05da7ad5db5

  • SHA1

    3a80891a8262beb59976fcad4cb12f2e183619bc

  • SHA256

    5d597c9d9079757dd3212b79e3092a77f100954526198a8df4fe72e47133f6c6

  • SHA512

    23c1ccb734415590aaeb10d3886c92394fd4780c57a4991123b040ed15fffc9d5dc6effea7536671eb694641db135bdce29615f48ee6a73575da158539d1bf3b

Malware Config

Targets

    • Target

      5d597c9d9079757dd3212b79e3092a77f100954526198a8df4fe72e47133f6c6

    • Size

      1.8MB

    • MD5

      bd446939da29c3ec6450c05da7ad5db5

    • SHA1

      3a80891a8262beb59976fcad4cb12f2e183619bc

    • SHA256

      5d597c9d9079757dd3212b79e3092a77f100954526198a8df4fe72e47133f6c6

    • SHA512

      23c1ccb734415590aaeb10d3886c92394fd4780c57a4991123b040ed15fffc9d5dc6effea7536671eb694641db135bdce29615f48ee6a73575da158539d1bf3b

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks