General

  • Target

    b76fd65fc3fdc83af52c3679f127aaef0aa0e39686d6e687f6558d4f53344ef6N

  • Size

    4.5MB

  • Sample

    241011-c77yxsxakq

  • MD5

    59892363215654e40cc4d64b6d521ca0

  • SHA1

    c0bfb7c5ac28e08e4637f04f8be2afcd0020e938

  • SHA256

    b76fd65fc3fdc83af52c3679f127aaef0aa0e39686d6e687f6558d4f53344ef6

  • SHA512

    0284a476f36af0126cc01e4358d944a07dcb054f27c85f33075f0860e4fcd008ec350dd03868a10cb74e4a8b804c4679d9c185b57fb36a78e9aeb926cac1d89a

  • SSDEEP

    24576:K1gg4CppEI6GGfWDkOQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu03:K1XP6rPbNechC0bNechC0bNec1

Malware Config

Targets

    • Target

      b76fd65fc3fdc83af52c3679f127aaef0aa0e39686d6e687f6558d4f53344ef6N

    • Size

      4.5MB

    • MD5

      59892363215654e40cc4d64b6d521ca0

    • SHA1

      c0bfb7c5ac28e08e4637f04f8be2afcd0020e938

    • SHA256

      b76fd65fc3fdc83af52c3679f127aaef0aa0e39686d6e687f6558d4f53344ef6

    • SHA512

      0284a476f36af0126cc01e4358d944a07dcb054f27c85f33075f0860e4fcd008ec350dd03868a10cb74e4a8b804c4679d9c185b57fb36a78e9aeb926cac1d89a

    • SSDEEP

      24576:K1gg4CppEI6GGfWDkOQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu03:K1XP6rPbNechC0bNechC0bNec1

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks