General

  • Target

    42c2cde1ea98c2bc8a7e00cd2e46c7c4.virus

  • Size

    2.9MB

  • Sample

    240917-v13pqsvfqq

  • MD5

    42c2cde1ea98c2bc8a7e00cd2e46c7c4

  • SHA1

    f6a95f6b37d89056a8d2cf4aea9ee47009c2d643

  • SHA256

    593beacbb281db226d3ee7f12b0a1ec0ffc7968058d6f3da1d3b873295bd34ec

  • SHA512

    d5f5e124e41826b1f837aa8d4222b360ebbe8a4faf5dae0a5ec501b83cd5636b7e26c86de84e85549dedb1a2bd0028ad20a9999435db1bd44db7978fab42bc8e

  • SSDEEP

    24576:bTO7AsmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHT:bTO7Asmw4gxeOw46fUbNecCCFbNecC

Malware Config

Targets

    • Target

      42c2cde1ea98c2bc8a7e00cd2e46c7c4.virus

    • Size

      2.9MB

    • MD5

      42c2cde1ea98c2bc8a7e00cd2e46c7c4

    • SHA1

      f6a95f6b37d89056a8d2cf4aea9ee47009c2d643

    • SHA256

      593beacbb281db226d3ee7f12b0a1ec0ffc7968058d6f3da1d3b873295bd34ec

    • SHA512

      d5f5e124e41826b1f837aa8d4222b360ebbe8a4faf5dae0a5ec501b83cd5636b7e26c86de84e85549dedb1a2bd0028ad20a9999435db1bd44db7978fab42bc8e

    • SSDEEP

      24576:bTO7AsmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHT:bTO7Asmw4gxeOw46fUbNecCCFbNecC

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks