General

  • Target

    f6298ff6c2335794e5591e2d51d4b6895ff3f51bf9aefb47020188d63423e247

  • Size

    1.8MB

  • Sample

    240909-e7yflavbmb

  • MD5

    ba343da1e56d2e2f60985752b7a87477

  • SHA1

    015733d0b3a9ec65314fcf739477efc7a0206af4

  • SHA256

    f6298ff6c2335794e5591e2d51d4b6895ff3f51bf9aefb47020188d63423e247

  • SHA512

    15711dfeaae09f6067363241ad3d7f36ba229055a2bcc8633f3a2abd1aa9de8482d0a5a3dfaa59b9d9e25228d8af5d9e89b6a11de29de67578e69493da29656d

  • SSDEEP

    12288:aq9MIJRSuKZhbnap2c7+wE6/tugWnlwGCbbFc576tA7W2FeDSIGVH/KIDgDgUeHb:atIzcbax3tug/BUQDbGV6eH8tkL

Malware Config

Targets

    • Target

      f6298ff6c2335794e5591e2d51d4b6895ff3f51bf9aefb47020188d63423e247

    • Size

      1.8MB

    • MD5

      ba343da1e56d2e2f60985752b7a87477

    • SHA1

      015733d0b3a9ec65314fcf739477efc7a0206af4

    • SHA256

      f6298ff6c2335794e5591e2d51d4b6895ff3f51bf9aefb47020188d63423e247

    • SHA512

      15711dfeaae09f6067363241ad3d7f36ba229055a2bcc8633f3a2abd1aa9de8482d0a5a3dfaa59b9d9e25228d8af5d9e89b6a11de29de67578e69493da29656d

    • SSDEEP

      12288:aq9MIJRSuKZhbnap2c7+wE6/tugWnlwGCbbFc576tA7W2FeDSIGVH/KIDgDgUeHb:atIzcbax3tug/BUQDbGV6eH8tkL

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks