General

  • Target

    b0c5c1941c34f48a8c286b4c0624dcd252e7c0e36d5c6dd41ac1c326bf6fe62a

  • Size

    2.9MB

  • Sample

    241106-cx45aateln

  • MD5

    32b4bbf74663a499e87d1f1f9e311886

  • SHA1

    c22ee34ff760a23415c56c8dd0aecf72fd3fe497

  • SHA256

    b0c5c1941c34f48a8c286b4c0624dcd252e7c0e36d5c6dd41ac1c326bf6fe62a

  • SHA512

    6c118caa6dd03a18727e50d82786ef7d7dcd6de5cfffff153bae3d9b494133fb3e29678d2e68266014e782e3afeb33374464d01800594b07e04ed9a8bca42ea6

  • SSDEEP

    24576:ATU7AfmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHa:ATU7Afmw4gxeOw46fUbNecCCFbNecf

Malware Config

Targets

    • Target

      b0c5c1941c34f48a8c286b4c0624dcd252e7c0e36d5c6dd41ac1c326bf6fe62a

    • Size

      2.9MB

    • MD5

      32b4bbf74663a499e87d1f1f9e311886

    • SHA1

      c22ee34ff760a23415c56c8dd0aecf72fd3fe497

    • SHA256

      b0c5c1941c34f48a8c286b4c0624dcd252e7c0e36d5c6dd41ac1c326bf6fe62a

    • SHA512

      6c118caa6dd03a18727e50d82786ef7d7dcd6de5cfffff153bae3d9b494133fb3e29678d2e68266014e782e3afeb33374464d01800594b07e04ed9a8bca42ea6

    • SSDEEP

      24576:ATU7AfmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHa:ATU7Afmw4gxeOw46fUbNecCCFbNecf

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks