General

  • Target

    5e323c11859b1f0667756345c3e0c7949012b65cabe0626307521a228055e0c9N

  • Size

    1.8MB

  • Sample

    240920-rf21xszgpf

  • MD5

    3267b173e5d86ec557fe2dc6a8bc47e0

  • SHA1

    6ecd84e8295bb03536c55004b403ed313c56b182

  • SHA256

    5e323c11859b1f0667756345c3e0c7949012b65cabe0626307521a228055e0c9

  • SHA512

    00965ff986ab3256198647619c5ad5dc34e2672ff7ab8fe34757a2013d8b291884b959dcaaf7bcfcb9db32c0945eb6defcf9df115a72da000845d2c8dd8965b3

  • SSDEEP

    12288:5UzTnjuWv0jtUgQ8RSG6FaavfQ/DxU61MIt3dYA7W2FeDSIGVH/KIDgDgUeHbY11:5HHjWHHaavUuiQDbGV6eH8tkq

Malware Config

Targets

    • Target

      5e323c11859b1f0667756345c3e0c7949012b65cabe0626307521a228055e0c9N

    • Size

      1.8MB

    • MD5

      3267b173e5d86ec557fe2dc6a8bc47e0

    • SHA1

      6ecd84e8295bb03536c55004b403ed313c56b182

    • SHA256

      5e323c11859b1f0667756345c3e0c7949012b65cabe0626307521a228055e0c9

    • SHA512

      00965ff986ab3256198647619c5ad5dc34e2672ff7ab8fe34757a2013d8b291884b959dcaaf7bcfcb9db32c0945eb6defcf9df115a72da000845d2c8dd8965b3

    • SSDEEP

      12288:5UzTnjuWv0jtUgQ8RSG6FaavfQ/DxU61MIt3dYA7W2FeDSIGVH/KIDgDgUeHbY11:5HHjWHHaavUuiQDbGV6eH8tkq

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks