General

  • Target

    2a9e80cda366cc83be162b65e0cd1d6d7d8132763f8795d8a43248889d080c35

  • Size

    2.9MB

  • Sample

    240903-ypme6avhln

  • MD5

    da9f70c1dceb2363bb9f27704bc59701

  • SHA1

    e3ecdb1cb293ebba3479cb0ee7ec0b22735644d2

  • SHA256

    2a9e80cda366cc83be162b65e0cd1d6d7d8132763f8795d8a43248889d080c35

  • SHA512

    2350e5b739725f96c039e816aa188fd33e3b5a261e0fd168deebe29f5cb472683998b2e8256c82571c601c0eebb10b86d977606e8a9d185b0eff7d5af936dd96

  • SSDEEP

    24576:sEk7A3mZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHg:sEk7A3mw4gxeOw46fUbNecCCFbNecj

Malware Config

Targets

    • Target

      2a9e80cda366cc83be162b65e0cd1d6d7d8132763f8795d8a43248889d080c35

    • Size

      2.9MB

    • MD5

      da9f70c1dceb2363bb9f27704bc59701

    • SHA1

      e3ecdb1cb293ebba3479cb0ee7ec0b22735644d2

    • SHA256

      2a9e80cda366cc83be162b65e0cd1d6d7d8132763f8795d8a43248889d080c35

    • SHA512

      2350e5b739725f96c039e816aa188fd33e3b5a261e0fd168deebe29f5cb472683998b2e8256c82571c601c0eebb10b86d977606e8a9d185b0eff7d5af936dd96

    • SSDEEP

      24576:sEk7A3mZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHg:sEk7A3mw4gxeOw46fUbNecCCFbNecj

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks