General

  • Target

    9ddb82e2dba4fb4896662ec176affd4ca534679d82fd54ff4a9ad465533687e6N

  • Size

    1.8MB

  • Sample

    241010-kkww5sscpc

  • MD5

    38e349f0d3e47f551245bbf782030100

  • SHA1

    585f635ddb83830fe026ca2f8cf8c1019c139690

  • SHA256

    9ddb82e2dba4fb4896662ec176affd4ca534679d82fd54ff4a9ad465533687e6

  • SHA512

    cfa8fb8d6340e4692337b8869205cc44bbf23fff313dca0153b62e1f94b606bebcc5220a44465925fbcf8342a77da3c2b3254ac06451afc94b4753e04d92a760

  • SSDEEP

    12288:BUrjP8Xuc2UY0B8TIwDDMistJ6gicRzubSFJeOgTpBA7W2FeDSIGVH/KIDgDgUeU:ujjSYIUDJ86giGTPQDbGV6eH81ko

Malware Config

Targets

    • Target

      9ddb82e2dba4fb4896662ec176affd4ca534679d82fd54ff4a9ad465533687e6N

    • Size

      1.8MB

    • MD5

      38e349f0d3e47f551245bbf782030100

    • SHA1

      585f635ddb83830fe026ca2f8cf8c1019c139690

    • SHA256

      9ddb82e2dba4fb4896662ec176affd4ca534679d82fd54ff4a9ad465533687e6

    • SHA512

      cfa8fb8d6340e4692337b8869205cc44bbf23fff313dca0153b62e1f94b606bebcc5220a44465925fbcf8342a77da3c2b3254ac06451afc94b4753e04d92a760

    • SSDEEP

      12288:BUrjP8Xuc2UY0B8TIwDDMistJ6gicRzubSFJeOgTpBA7W2FeDSIGVH/KIDgDgUeU:ujjSYIUDJ86giGTPQDbGV6eH81ko

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks