General

  • Target

    3862972f557cdda70fcc672a92efd171f1de7324481fb3367e46afe94e79ac2d

  • Size

    6.1MB

  • Sample

    240828-zs65eawbpc

  • MD5

    10ccfb48b3fdac746af0a198cd947288

  • SHA1

    71200c1c2a052da712f1b086578f68cf5a4388af

  • SHA256

    3862972f557cdda70fcc672a92efd171f1de7324481fb3367e46afe94e79ac2d

  • SHA512

    e6b8830e70c8c11d69a33277a96cb8a0bf4bf485641440ffd754ff176b07eb112905d39b564a0438adb7b3c45eb04b8a1b9275a7549c97f33f351ab95d65fead

  • SSDEEP

    49152:ATU7AAmw4gxeOw46fUbNecCCFbNecjTU7AAmw4gxeOw46fUbNecCCFbNecu:ATU7d9xZw46G8q8yTU7d9xZw46G8q8N

Malware Config

Targets

    • Target

      3862972f557cdda70fcc672a92efd171f1de7324481fb3367e46afe94e79ac2d

    • Size

      6.1MB

    • MD5

      10ccfb48b3fdac746af0a198cd947288

    • SHA1

      71200c1c2a052da712f1b086578f68cf5a4388af

    • SHA256

      3862972f557cdda70fcc672a92efd171f1de7324481fb3367e46afe94e79ac2d

    • SHA512

      e6b8830e70c8c11d69a33277a96cb8a0bf4bf485641440ffd754ff176b07eb112905d39b564a0438adb7b3c45eb04b8a1b9275a7549c97f33f351ab95d65fead

    • SSDEEP

      49152:ATU7AAmw4gxeOw46fUbNecCCFbNecjTU7AAmw4gxeOw46fUbNecCCFbNecu:ATU7d9xZw46G8q8yTU7d9xZw46G8q8N

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks