General

  • Target

    bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b

  • Size

    8.2MB

  • Sample

    241028-esrdqsxrcw

  • MD5

    51afbe00ab7ef0098ff0dfa7a1a78f04

  • SHA1

    1d783e79b9b74e44b1ecd98c882cf2a6270cd584

  • SHA256

    bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b

  • SHA512

    aef6f0a60939babbbdaf7761f5d8b4168086be1a951e3f1c1fa853596e6785cbc3e9e4e0d4284140f4018f773a2697a7d8272d21013438da8cf34c95feb34bd4

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNece:V8e8e8f8e8e8r

Malware Config

Targets

    • Target

      bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b

    • Size

      8.2MB

    • MD5

      51afbe00ab7ef0098ff0dfa7a1a78f04

    • SHA1

      1d783e79b9b74e44b1ecd98c882cf2a6270cd584

    • SHA256

      bfad1d221fe492cce9c76977376fc7d1e92b7ff4f55dfb135c9bf9f193aed46b

    • SHA512

      aef6f0a60939babbbdaf7761f5d8b4168086be1a951e3f1c1fa853596e6785cbc3e9e4e0d4284140f4018f773a2697a7d8272d21013438da8cf34c95feb34bd4

    • SSDEEP

      49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNece:V8e8e8f8e8e8r

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks