General

  • Target

    89c73a4b0e1ec4b864c3dffd8f314ad85ce52c79e07c6a71e4612086fb0488b0N

  • Size

    1.2MB

  • Sample

    241005-d18gjssgnn

  • MD5

    ab66af48621552d289c68b3f197fbef0

  • SHA1

    07259f3720f62eac6c1230c8eee49678de44c530

  • SHA256

    89c73a4b0e1ec4b864c3dffd8f314ad85ce52c79e07c6a71e4612086fb0488b0

  • SHA512

    e27d5e7edc70cb5adb0beee8c917f8cc474d82003afd34f55225565ff50dbfb31e09a3e2ae2c674483aa3ff319fbd40291416a300fc9c9517a0d826c079c250e

  • SSDEEP

    12288:OIbsBDU0I6+Tu0TJ0N1oYgNOFDA7W2FeDSIGVH/KIDgDgUeHbY11kj:OIbGD2JTu0GoZQDbGV6eH81kj

Malware Config

Targets

    • Target

      89c73a4b0e1ec4b864c3dffd8f314ad85ce52c79e07c6a71e4612086fb0488b0N

    • Size

      1.2MB

    • MD5

      ab66af48621552d289c68b3f197fbef0

    • SHA1

      07259f3720f62eac6c1230c8eee49678de44c530

    • SHA256

      89c73a4b0e1ec4b864c3dffd8f314ad85ce52c79e07c6a71e4612086fb0488b0

    • SHA512

      e27d5e7edc70cb5adb0beee8c917f8cc474d82003afd34f55225565ff50dbfb31e09a3e2ae2c674483aa3ff319fbd40291416a300fc9c9517a0d826c079c250e

    • SSDEEP

      12288:OIbsBDU0I6+Tu0TJ0N1oYgNOFDA7W2FeDSIGVH/KIDgDgUeHbY11kj:OIbGD2JTu0GoZQDbGV6eH81kj

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks