General

  • Target

    e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN

  • Size

    6.1MB

  • Sample

    240923-c7lqpavakn

  • MD5

    8366095353711474f30ebee85c51a090

  • SHA1

    e8a0aea3dd081528cb9edd6fb454b6ac47177e1c

  • SHA256

    e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baa

  • SHA512

    50ebb10387b8c0ed3a64142c98cc6868320e3388bc4d6ba47addb9baf17203a6c5264053787749c53aaddb7a5ec6948d954555be7197b8f30c06d15a09091ad1

  • SSDEEP

    49152:ATU7AAmw4gxeOw46fUbNecCCFbNecjTU7AAmw4gxeOw46fUbNecCCFbNecq:ATU7d9xZw46G8q8yTU7d9xZw46G8q8t

Malware Config

Targets

    • Target

      e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN

    • Size

      6.1MB

    • MD5

      8366095353711474f30ebee85c51a090

    • SHA1

      e8a0aea3dd081528cb9edd6fb454b6ac47177e1c

    • SHA256

      e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baa

    • SHA512

      50ebb10387b8c0ed3a64142c98cc6868320e3388bc4d6ba47addb9baf17203a6c5264053787749c53aaddb7a5ec6948d954555be7197b8f30c06d15a09091ad1

    • SSDEEP

      49152:ATU7AAmw4gxeOw46fUbNecCCFbNecjTU7AAmw4gxeOw46fUbNecCCFbNecq:ATU7d9xZw46G8q8yTU7d9xZw46G8q8t

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks