General

  • Target

    02cc89bb7c64919d3c27e9b8ac637e847aca5c68c2b990f33a800445a3f0164d

  • Size

    2.9MB

  • Sample

    240513-wsh6sshb77

  • MD5

    60a69e78e37de9936c7d7274c67abda4

  • SHA1

    7687addc4a89ced80ce7dd372422b7d91ee8d4f3

  • SHA256

    02cc89bb7c64919d3c27e9b8ac637e847aca5c68c2b990f33a800445a3f0164d

  • SHA512

    754ab07ea26d0512422de8b3375be68366fc7def4511b8313db08d38f424eaf9f857aea46900c1e9e6c61418d15571762bdc5adb1fa6aec5e08256f425522464

  • SSDEEP

    24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHn:ATU7AAmw4gxeOw46fUbNecCCFbNecQ

Malware Config

Targets

    • Target

      02cc89bb7c64919d3c27e9b8ac637e847aca5c68c2b990f33a800445a3f0164d

    • Size

      2.9MB

    • MD5

      60a69e78e37de9936c7d7274c67abda4

    • SHA1

      7687addc4a89ced80ce7dd372422b7d91ee8d4f3

    • SHA256

      02cc89bb7c64919d3c27e9b8ac637e847aca5c68c2b990f33a800445a3f0164d

    • SHA512

      754ab07ea26d0512422de8b3375be68366fc7def4511b8313db08d38f424eaf9f857aea46900c1e9e6c61418d15571762bdc5adb1fa6aec5e08256f425522464

    • SSDEEP

      24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHn:ATU7AAmw4gxeOw46fUbNecCCFbNecQ

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Detects executables packed with ASPack

    • UPX dump on OEP (original entry point)

    • Warzone RAT payload

    • Modifies Installed Components in the registry

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Privilege Escalation

Boot or Logon Autostart Execution

3
T1547

Registry Run Keys / Startup Folder

2
T1547.001

Winlogon Helper DLL

1
T1547.004

Defense Evasion

Modify Registry

4
T1112

Hide Artifacts

1
T1564

Hidden Files and Directories

1
T1564.001

Discovery

System Information Discovery

1
T1082

Tasks