General

  • Target

    ecb43e6c11a924d395e2a74370145964f1d6b0c81b8cb3d800a41e8ca888aafeN

  • Size

    4.5MB

  • Sample

    241007-jgzcestejm

  • MD5

    d35d1e6104187459a393b813d755cd90

  • SHA1

    058c95af9dbad498c3123524bc60001947305b28

  • SHA256

    ecb43e6c11a924d395e2a74370145964f1d6b0c81b8cb3d800a41e8ca888aafe

  • SHA512

    88cee9369399be855d40450c725094f5442082d55b0076ac4c6f3a447669927ce4a663a408e810933ceb2638ecbf6842625a3c75a1efe86bbd75bedda7073dac

  • SSDEEP

    24576:K1gg4CppEI6GGfWDkOQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0z:K1XP6rPbNechC0bNechC0bNec9

Malware Config

Targets

    • Target

      ecb43e6c11a924d395e2a74370145964f1d6b0c81b8cb3d800a41e8ca888aafeN

    • Size

      4.5MB

    • MD5

      d35d1e6104187459a393b813d755cd90

    • SHA1

      058c95af9dbad498c3123524bc60001947305b28

    • SHA256

      ecb43e6c11a924d395e2a74370145964f1d6b0c81b8cb3d800a41e8ca888aafe

    • SHA512

      88cee9369399be855d40450c725094f5442082d55b0076ac4c6f3a447669927ce4a663a408e810933ceb2638ecbf6842625a3c75a1efe86bbd75bedda7073dac

    • SSDEEP

      24576:K1gg4CppEI6GGfWDkOQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0z:K1XP6rPbNechC0bNechC0bNec9

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks