General

  • Target

    fcb4721b5321a9032625f9f45864fea5d4559bc7e9ea7371b6701e2c22443e13N

  • Size

    1.8MB

  • Sample

    241030-syavtsxpel

  • MD5

    c2364d50aced195860423b58c93b5170

  • SHA1

    eb0e31653cf9190cc6ed56c26198c9a80c801c85

  • SHA256

    fcb4721b5321a9032625f9f45864fea5d4559bc7e9ea7371b6701e2c22443e13

  • SHA512

    4bfbd391d49d528f57d54c340effa9236ba408bb5aa0143b16b54390d54db58a9685c2b6332ad2005f948ce310a551366651a08a4569c7965761800e8e2ed569

  • SSDEEP

    12288:5UzTnjuWv0jtUgQ8RSG6FaavfQ/DxU61MIt3dYA7W2FeDSIGVH/KIDgDgUeHbY1T:5HHjWHHaavUuiQDbGV6eH8tky

Malware Config

Targets

    • Target

      fcb4721b5321a9032625f9f45864fea5d4559bc7e9ea7371b6701e2c22443e13N

    • Size

      1.8MB

    • MD5

      c2364d50aced195860423b58c93b5170

    • SHA1

      eb0e31653cf9190cc6ed56c26198c9a80c801c85

    • SHA256

      fcb4721b5321a9032625f9f45864fea5d4559bc7e9ea7371b6701e2c22443e13

    • SHA512

      4bfbd391d49d528f57d54c340effa9236ba408bb5aa0143b16b54390d54db58a9685c2b6332ad2005f948ce310a551366651a08a4569c7965761800e8e2ed569

    • SSDEEP

      12288:5UzTnjuWv0jtUgQ8RSG6FaavfQ/DxU61MIt3dYA7W2FeDSIGVH/KIDgDgUeHbY1T:5HHjWHHaavUuiQDbGV6eH8tky

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks