General

  • Target

    3ff720c6adc6601facc4be54c8659045d9350c70b69289d9b49bf6d6b44831d4N

  • Size

    2.9MB

  • Sample

    241030-rncq1atnby

  • MD5

    119de22bdc7a601bf217793c08c51490

  • SHA1

    63ab3bbb23e8b35a29773ce7b4f1be092c8fb3e7

  • SHA256

    3ff720c6adc6601facc4be54c8659045d9350c70b69289d9b49bf6d6b44831d4

  • SHA512

    98e36f6facff2f3264fddce8ee5fbdbdc2aadf36c299385fad39eb566e9d4778701e2b7bf0e14b79296051f815c25437b142382da60b385df08a84ec4ecb51dd

  • SSDEEP

    24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH2:7v97AXmw4gxeOw46fUbNecCCFbNecZ

Malware Config

Targets

    • Target

      3ff720c6adc6601facc4be54c8659045d9350c70b69289d9b49bf6d6b44831d4N

    • Size

      2.9MB

    • MD5

      119de22bdc7a601bf217793c08c51490

    • SHA1

      63ab3bbb23e8b35a29773ce7b4f1be092c8fb3e7

    • SHA256

      3ff720c6adc6601facc4be54c8659045d9350c70b69289d9b49bf6d6b44831d4

    • SHA512

      98e36f6facff2f3264fddce8ee5fbdbdc2aadf36c299385fad39eb566e9d4778701e2b7bf0e14b79296051f815c25437b142382da60b385df08a84ec4ecb51dd

    • SSDEEP

      24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH2:7v97AXmw4gxeOw46fUbNecCCFbNecZ

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks