General

  • Target

    dba7c1179e386b32ab9a0af8d9d6a58d90757a5ab0d4dab81a65c52043ae58d5

  • Size

    3.2MB

  • Sample

    210516-3hflbfc11j

  • MD5

    b81e06b29c4e1058dd8755929a9a2d9e

  • SHA1

    88fd34046f329f209023aa368f230e9b432e4291

  • SHA256

    dba7c1179e386b32ab9a0af8d9d6a58d90757a5ab0d4dab81a65c52043ae58d5

  • SHA512

    b74cd3db0cc851e1dde6c36a6de32f3102439c788f398b90699ce47f92e7722f9b177838d739801ec19e991e17ceddfa0ff6ddfbb0525233281e9d091a5a2e53

Malware Config

Targets

    • Target

      dba7c1179e386b32ab9a0af8d9d6a58d90757a5ab0d4dab81a65c52043ae58d5

    • Size

      3.2MB

    • MD5

      b81e06b29c4e1058dd8755929a9a2d9e

    • SHA1

      88fd34046f329f209023aa368f230e9b432e4291

    • SHA256

      dba7c1179e386b32ab9a0af8d9d6a58d90757a5ab0d4dab81a65c52043ae58d5

    • SHA512

      b74cd3db0cc851e1dde6c36a6de32f3102439c788f398b90699ce47f92e7722f9b177838d739801ec19e991e17ceddfa0ff6ddfbb0525233281e9d091a5a2e53

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Executes dropped EXE

    • Modifies Installed Components in the registry

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks