General

  • Target

    9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN

  • Size

    2.9MB

  • Sample

    241103-fp5ydsylhm

  • MD5

    e4632ceb0f9ccba10bf5f0999edfdf20

  • SHA1

    3606611240f3ca829273440356cfba32df555a02

  • SHA256

    9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cf

  • SHA512

    99890e77a15fc3d8702306606a3a4819e1af542979743caf830314435bb53a3851c1b261496b318884d3e15e3a3c15faeae1bdadc357f7e441d03c0d03e5172d

  • SSDEEP

    24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH7:7v97AXmw4gxeOw46fUbNecCCFbNecY

Malware Config

Targets

    • Target

      9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cfN

    • Size

      2.9MB

    • MD5

      e4632ceb0f9ccba10bf5f0999edfdf20

    • SHA1

      3606611240f3ca829273440356cfba32df555a02

    • SHA256

      9fa5cb7ba3209d53956cfc7f611850c82ee582d315407e0b3bbbbea69e3d12cf

    • SHA512

      99890e77a15fc3d8702306606a3a4819e1af542979743caf830314435bb53a3851c1b261496b318884d3e15e3a3c15faeae1bdadc357f7e441d03c0d03e5172d

    • SSDEEP

      24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH7:7v97AXmw4gxeOw46fUbNecCCFbNecY

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks