General

  • Target

    abe385f88e54ae99d85ee2e832f85852e9e39212013e9cae7e126d29ce88578dN

  • Size

    1.8MB

  • Sample

    241028-nascrayamm

  • MD5

    75ba1a7c4abff1d0e9175744abeac050

  • SHA1

    4aa33c759c6322a6cf46e5c423e681de2671cf48

  • SHA256

    abe385f88e54ae99d85ee2e832f85852e9e39212013e9cae7e126d29ce88578d

  • SHA512

    209464d6fadc6845288b1a5e39acdd3cf6eb0bb47b77755ac6b22bf1d99836107c663e2cb82e57e6b77cfcf5be6d4069d62f47b0e2b40809967609936a634bf1

  • SSDEEP

    12288:BUrjP8Xuc2UY0B8TIwDDMistJ6gicRzubSFJeOgTpBA7W2FeDSIGVH/KIDgDgUe6:ujjSYIUDJ86giGTPQDbGV6eH81ku

Malware Config

Targets

    • Target

      abe385f88e54ae99d85ee2e832f85852e9e39212013e9cae7e126d29ce88578dN

    • Size

      1.8MB

    • MD5

      75ba1a7c4abff1d0e9175744abeac050

    • SHA1

      4aa33c759c6322a6cf46e5c423e681de2671cf48

    • SHA256

      abe385f88e54ae99d85ee2e832f85852e9e39212013e9cae7e126d29ce88578d

    • SHA512

      209464d6fadc6845288b1a5e39acdd3cf6eb0bb47b77755ac6b22bf1d99836107c663e2cb82e57e6b77cfcf5be6d4069d62f47b0e2b40809967609936a634bf1

    • SSDEEP

      12288:BUrjP8Xuc2UY0B8TIwDDMistJ6gicRzubSFJeOgTpBA7W2FeDSIGVH/KIDgDgUe6:ujjSYIUDJ86giGTPQDbGV6eH81ku

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks