General

  • Target

    37d734daa68d24e8348065e9627797a606d4451ade85b4726034948f988874a5N

  • Size

    2.9MB

  • Sample

    241029-cyg15stbnl

  • MD5

    7d39c75167c84c2cc8154a967a977e60

  • SHA1

    c5b2ad550cca9ad354b5650d99539bbc20413fba

  • SHA256

    37d734daa68d24e8348065e9627797a606d4451ade85b4726034948f988874a5

  • SHA512

    f2560b805dc45d88d209c497c1f93351235730731c7e1849c1a72a45ca1c9a8c225c6e9aba79f2032d55961bf4afcdf97eb64b0ffd3daa66fd90d58aec14e5b7

  • SSDEEP

    24576:eTy7ASmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHL:eTy7ASmw4gxeOw46fUbNecCCFbNecQ

Malware Config

Targets

    • Target

      37d734daa68d24e8348065e9627797a606d4451ade85b4726034948f988874a5N

    • Size

      2.9MB

    • MD5

      7d39c75167c84c2cc8154a967a977e60

    • SHA1

      c5b2ad550cca9ad354b5650d99539bbc20413fba

    • SHA256

      37d734daa68d24e8348065e9627797a606d4451ade85b4726034948f988874a5

    • SHA512

      f2560b805dc45d88d209c497c1f93351235730731c7e1849c1a72a45ca1c9a8c225c6e9aba79f2032d55961bf4afcdf97eb64b0ffd3daa66fd90d58aec14e5b7

    • SSDEEP

      24576:eTy7ASmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHL:eTy7ASmw4gxeOw46fUbNecCCFbNecQ

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks