General

  • Target

    b541ae7aed1c48624c4fddef9cb7b885392c7a7c8f6333b26e5ca6f0efc4d674

  • Size

    2.9MB

  • Sample

    240904-mrrbcazcrb

  • MD5

    3ddd6e0311da714340fceed86d520f22

  • SHA1

    4afee630507566f1d20d9e9ea7a1d5ae99e4d5db

  • SHA256

    b541ae7aed1c48624c4fddef9cb7b885392c7a7c8f6333b26e5ca6f0efc4d674

  • SHA512

    bbde88784938554286e1cdd6dda7a3ef8d4cc20f887dc1795ff7cd37c77464d8175b43101297fd9bf21d60b18ee06ef0d0c63eb93b28a0e1e8e83312b59842ae

  • SSDEEP

    24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHQ:7v97AXmw4gxeOw46fUbNecCCFbNec3

Malware Config

Targets

    • Target

      b541ae7aed1c48624c4fddef9cb7b885392c7a7c8f6333b26e5ca6f0efc4d674

    • Size

      2.9MB

    • MD5

      3ddd6e0311da714340fceed86d520f22

    • SHA1

      4afee630507566f1d20d9e9ea7a1d5ae99e4d5db

    • SHA256

      b541ae7aed1c48624c4fddef9cb7b885392c7a7c8f6333b26e5ca6f0efc4d674

    • SHA512

      bbde88784938554286e1cdd6dda7a3ef8d4cc20f887dc1795ff7cd37c77464d8175b43101297fd9bf21d60b18ee06ef0d0c63eb93b28a0e1e8e83312b59842ae

    • SSDEEP

      24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHQ:7v97AXmw4gxeOw46fUbNecCCFbNec3

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks