General

  • Target

    fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N

  • Size

    3.9MB

  • Sample

    241025-xr7cnszrgl

  • MD5

    5309c3f6de55185dedb1c353afa27c80

  • SHA1

    d181c03c655ad31440248ebb398a91c35defed39

  • SHA256

    fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583

  • SHA512

    0c10ac905296f1a360c2d48b13669bc9dd6f3c1d4e7b8bce495e29e69c137204bcf946935336629b14a539c782320e995313bba2c59af31b350f810bcda6dca9

  • SSDEEP

    24576:GIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDW:7C0bNechC0bNechC0bNecO

Malware Config

Targets

    • Target

      fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583N

    • Size

      3.9MB

    • MD5

      5309c3f6de55185dedb1c353afa27c80

    • SHA1

      d181c03c655ad31440248ebb398a91c35defed39

    • SHA256

      fdbfec821ce43125f7e1108bfb22bab9a6e52af0dbc1b7abb08f15daf2fd8583

    • SHA512

      0c10ac905296f1a360c2d48b13669bc9dd6f3c1d4e7b8bce495e29e69c137204bcf946935336629b14a539c782320e995313bba2c59af31b350f810bcda6dca9

    • SSDEEP

      24576:GIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDW:7C0bNechC0bNechC0bNecO

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks