General

  • Target

    f914ad33558dee03a8ad15a0f4c36fb6bbfb8d4d3dda8ebff6831d6b99dbd318N

  • Size

    8.9MB

  • Sample

    241106-cb79tatcjn

  • MD5

    db9493eddb9ad914244be4dc6f8a1190

  • SHA1

    5c3cc40ec64f76ef044a99945a7543877e6f1ea0

  • SHA256

    f914ad33558dee03a8ad15a0f4c36fb6bbfb8d4d3dda8ebff6831d6b99dbd318

  • SHA512

    a34aa1302f59d733fd94cc76e26eb5af886ea0c61f57cc8aa38f224642a3d1eb28c99f10b2e4bcb489c0fe0a3a4c8800ee62e559501a23633bf54af57d09f615

  • SSDEEP

    49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecA:K1+8e8e8f8e8e8n

Malware Config

Targets

    • Target

      f914ad33558dee03a8ad15a0f4c36fb6bbfb8d4d3dda8ebff6831d6b99dbd318N

    • Size

      8.9MB

    • MD5

      db9493eddb9ad914244be4dc6f8a1190

    • SHA1

      5c3cc40ec64f76ef044a99945a7543877e6f1ea0

    • SHA256

      f914ad33558dee03a8ad15a0f4c36fb6bbfb8d4d3dda8ebff6831d6b99dbd318

    • SHA512

      a34aa1302f59d733fd94cc76e26eb5af886ea0c61f57cc8aa38f224642a3d1eb28c99f10b2e4bcb489c0fe0a3a4c8800ee62e559501a23633bf54af57d09f615

    • SSDEEP

      49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecA:K1+8e8e8f8e8e8n

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks