General

  • Target

    b54d817beaacd9d20813a137e77508aa408f2b938c2730dcb5a485baa67f7e44

  • Size

    8.9MB

  • Sample

    241106-c2afgawjgn

  • MD5

    ed5809b8196985ad7417d1a73d1c0e8c

  • SHA1

    330a63adec10364c8ad4ffd349289bbc72d10952

  • SHA256

    b54d817beaacd9d20813a137e77508aa408f2b938c2730dcb5a485baa67f7e44

  • SHA512

    d0ef40a4b627ab8ce2dd090001e9cc7deae7013c777ef81be38f4032ce87c776f185348dc3a006b0e26f00267003a82055fa5c035658522bbe8f82fa86beee2e

  • SSDEEP

    49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecB:K1+8e8e8f8e8e8Y

Malware Config

Targets

    • Target

      b54d817beaacd9d20813a137e77508aa408f2b938c2730dcb5a485baa67f7e44

    • Size

      8.9MB

    • MD5

      ed5809b8196985ad7417d1a73d1c0e8c

    • SHA1

      330a63adec10364c8ad4ffd349289bbc72d10952

    • SHA256

      b54d817beaacd9d20813a137e77508aa408f2b938c2730dcb5a485baa67f7e44

    • SHA512

      d0ef40a4b627ab8ce2dd090001e9cc7deae7013c777ef81be38f4032ce87c776f185348dc3a006b0e26f00267003a82055fa5c035658522bbe8f82fa86beee2e

    • SSDEEP

      49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecB:K1+8e8e8f8e8e8Y

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks