General

  • Target

    d48a534edaf9858df888bf49e28d9795f01436e59533657034a6c6db17611e98

  • Size

    1.8MB

  • Sample

    241104-fwsawaxlem

  • MD5

    8c1a479be78cd6d68a67397c438c5459

  • SHA1

    ef277c7d21e3241c7628819ab81e19e84a1814d4

  • SHA256

    d48a534edaf9858df888bf49e28d9795f01436e59533657034a6c6db17611e98

  • SHA512

    378f9e72ad814f994bab2514dd0fe93a1703538e6e3d86599db6c3d52291459e9341dec69d2365f21b271f22c4ba1478e228d6d5761eeea6d39d08e87a28bf49

  • SSDEEP

    12288:5UzTnjuWv0jtUgQ8RSG6FaavfQ/DxU61MIt3dYA7W2FeDSIGVH/KIDgDgUeHbY1T:5HHjWHHaavUuiQDbGV6eH8tkQ

Malware Config

Targets

    • Target

      d48a534edaf9858df888bf49e28d9795f01436e59533657034a6c6db17611e98

    • Size

      1.8MB

    • MD5

      8c1a479be78cd6d68a67397c438c5459

    • SHA1

      ef277c7d21e3241c7628819ab81e19e84a1814d4

    • SHA256

      d48a534edaf9858df888bf49e28d9795f01436e59533657034a6c6db17611e98

    • SHA512

      378f9e72ad814f994bab2514dd0fe93a1703538e6e3d86599db6c3d52291459e9341dec69d2365f21b271f22c4ba1478e228d6d5761eeea6d39d08e87a28bf49

    • SSDEEP

      12288:5UzTnjuWv0jtUgQ8RSG6FaavfQ/DxU61MIt3dYA7W2FeDSIGVH/KIDgDgUeHbY1T:5HHjWHHaavUuiQDbGV6eH8tkQ

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks