General

  • Target

    ef3c586c8e14ed856d7c14ba3848d0a7c5e08e6a4456239dda43178d29e5ef6bN

  • Size

    2.9MB

  • Sample

    240922-c9gjraycpd

  • MD5

    291686885d1bedf3b54ef2c7b68eb450

  • SHA1

    b7eb1ac2ec8f6e1cbd1ca3f1a784f7161a8593f5

  • SHA256

    ef3c586c8e14ed856d7c14ba3848d0a7c5e08e6a4456239dda43178d29e5ef6b

  • SHA512

    38e1449d932659f09f60de8d2dc412da1bbae75cc9fb3f5ea418d055aca17d62ae9269f490270219af778466b4ed840ae520e0e3d17ea4615fdd49df85861abc

  • SSDEEP

    24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHN:ATU7AAmw4gxeOw46fUbNecCCFbNecU

Malware Config

Targets

    • Target

      ef3c586c8e14ed856d7c14ba3848d0a7c5e08e6a4456239dda43178d29e5ef6bN

    • Size

      2.9MB

    • MD5

      291686885d1bedf3b54ef2c7b68eb450

    • SHA1

      b7eb1ac2ec8f6e1cbd1ca3f1a784f7161a8593f5

    • SHA256

      ef3c586c8e14ed856d7c14ba3848d0a7c5e08e6a4456239dda43178d29e5ef6b

    • SHA512

      38e1449d932659f09f60de8d2dc412da1bbae75cc9fb3f5ea418d055aca17d62ae9269f490270219af778466b4ed840ae520e0e3d17ea4615fdd49df85861abc

    • SSDEEP

      24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHN:ATU7AAmw4gxeOw46fUbNecCCFbNecU

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks