General

  • Target

    1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N

  • Size

    8.2MB

  • Sample

    241030-lkrg4ayrcz

  • MD5

    1b6f9f0f8009139a81698cda6e140700

  • SHA1

    dd575d166428d7fca33b522914846d09f167b5e9

  • SHA256

    1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8

  • SHA512

    b930864fc236b0c4f997ac2ce908a5d70bfea833d1c639cb8a6212265e7199ba295400acc09fc5fe66706feded3b5ca46fdf80440e441ac7d6207b8379adbb62

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecS:V8e8e8f8e8e8X

Malware Config

Targets

    • Target

      1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8N

    • Size

      8.2MB

    • MD5

      1b6f9f0f8009139a81698cda6e140700

    • SHA1

      dd575d166428d7fca33b522914846d09f167b5e9

    • SHA256

      1e42befc54138f756db19bc589873d8ef5b1bc791546111aae147b355a7920c8

    • SHA512

      b930864fc236b0c4f997ac2ce908a5d70bfea833d1c639cb8a6212265e7199ba295400acc09fc5fe66706feded3b5ca46fdf80440e441ac7d6207b8379adbb62

    • SSDEEP

      49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecS:V8e8e8f8e8e8X

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks