General

  • Target

    4b64dce38aadb37cb9b902d686871524da8794a010fd8e4acd216fcc570bbd2bN

  • Size

    4.5MB

  • Sample

    241026-zk964azdkn

  • MD5

    2a9773eb1bb835fd8673a295de4685e0

  • SHA1

    8b710bc185f28a5e589411fe4871f0144d191da1

  • SHA256

    4b64dce38aadb37cb9b902d686871524da8794a010fd8e4acd216fcc570bbd2b

  • SHA512

    b431dad2eca35a3c5217248ebbf8e1be2191abf98464d25853c201c174fc0bcf8e0f2014b4b4411473c9e5014b24348c01087cd2fbbf082fde297ccf8f9e6ccb

  • SSDEEP

    24576:K1gg4CppEI6GGfWDkOQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0B:K1XP6rPbNechC0bNechC0bNec3

Malware Config

Targets

    • Target

      4b64dce38aadb37cb9b902d686871524da8794a010fd8e4acd216fcc570bbd2bN

    • Size

      4.5MB

    • MD5

      2a9773eb1bb835fd8673a295de4685e0

    • SHA1

      8b710bc185f28a5e589411fe4871f0144d191da1

    • SHA256

      4b64dce38aadb37cb9b902d686871524da8794a010fd8e4acd216fcc570bbd2b

    • SHA512

      b431dad2eca35a3c5217248ebbf8e1be2191abf98464d25853c201c174fc0bcf8e0f2014b4b4411473c9e5014b24348c01087cd2fbbf082fde297ccf8f9e6ccb

    • SSDEEP

      24576:K1gg4CppEI6GGfWDkOQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0B:K1XP6rPbNechC0bNechC0bNec3

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks