General

  • Target

    ecda55c7df6a1947a0ef4f1d34fd2ad969777e7eebfe2a40838a8b72d2881e66N

  • Size

    8.8MB

  • Sample

    241103-q6m41svlg1

  • MD5

    17d0b1dfbf54177c8daafabfd20116c0

  • SHA1

    35387810a5db26159c6b72ee1985df219d67b33a

  • SHA256

    ecda55c7df6a1947a0ef4f1d34fd2ad969777e7eebfe2a40838a8b72d2881e66

  • SHA512

    eb2e4881cb3d9df6f707f4e023bd4bc03ef290c41d0e2e12934b089c32a79c31508a658e571c6ea4aec6bac4abd7fc399a41369aef65f6a90cbe302351c7f845

  • SSDEEP

    49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecJ:K1+8e8e8f8e8e8c

Malware Config

Targets

    • Target

      ecda55c7df6a1947a0ef4f1d34fd2ad969777e7eebfe2a40838a8b72d2881e66N

    • Size

      8.8MB

    • MD5

      17d0b1dfbf54177c8daafabfd20116c0

    • SHA1

      35387810a5db26159c6b72ee1985df219d67b33a

    • SHA256

      ecda55c7df6a1947a0ef4f1d34fd2ad969777e7eebfe2a40838a8b72d2881e66

    • SHA512

      eb2e4881cb3d9df6f707f4e023bd4bc03ef290c41d0e2e12934b089c32a79c31508a658e571c6ea4aec6bac4abd7fc399a41369aef65f6a90cbe302351c7f845

    • SSDEEP

      49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecJ:K1+8e8e8f8e8e8c

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks