General

  • Target

    fdc9544ad7d89ee56806c1e81e74c92a3f49c633137eebe04dba683a74e19fcdN

  • Size

    3.9MB

  • Sample

    240923-rsmrrsydql

  • MD5

    feb5dbfca6dc5890d599c3d64b691590

  • SHA1

    f33c30e54f91408725453cb48b382b6655e6321e

  • SHA256

    fdc9544ad7d89ee56806c1e81e74c92a3f49c633137eebe04dba683a74e19fcd

  • SHA512

    e2b5fb2b79abbfdbd0ec2d936b7f5aad087d84161d68af10f86432b4cca63244ed29d51e066ff7e6b9a6610f59cfb75ef110fd010640c2b08136757e8269e9f8

  • SSDEEP

    24576:GIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQD/:7C0bNechC0bNechC0bNecX

Malware Config

Targets

    • Target

      fdc9544ad7d89ee56806c1e81e74c92a3f49c633137eebe04dba683a74e19fcdN

    • Size

      3.9MB

    • MD5

      feb5dbfca6dc5890d599c3d64b691590

    • SHA1

      f33c30e54f91408725453cb48b382b6655e6321e

    • SHA256

      fdc9544ad7d89ee56806c1e81e74c92a3f49c633137eebe04dba683a74e19fcd

    • SHA512

      e2b5fb2b79abbfdbd0ec2d936b7f5aad087d84161d68af10f86432b4cca63244ed29d51e066ff7e6b9a6610f59cfb75ef110fd010640c2b08136757e8269e9f8

    • SSDEEP

      24576:GIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQD/:7C0bNechC0bNechC0bNecX

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks