General

  • Target

    80d87ae4cea90c2adb4f17cd0dbcb76b1b9709630aed77d1aa71d465917fde1b

  • Size

    1.8MB

  • Sample

    241108-a8n64a1gkr

  • MD5

    0982abc196688fa6faf5306f9ece4f3c

  • SHA1

    d9c32fb8547400bf00443421643fc5a381cf4403

  • SHA256

    80d87ae4cea90c2adb4f17cd0dbcb76b1b9709630aed77d1aa71d465917fde1b

  • SHA512

    754cbe9cd70ef6c10fa69b0b80b755260f965694de5b3fb86890e49e23505de9fbbe39f45bb1bcd000c309baa868a81a61d168e314a5152fc3b2ade9cc8a0738

  • SSDEEP

    12288:5UzTnjuWv0jtUgQ8RSG6FaavfQ/DxU61MIt3dYA7W2FeDSIGVH/KIDgDgUeHbY1I:5HHjWHHaavUuiQDbGV6eH8tk/

Malware Config

Targets

    • Target

      80d87ae4cea90c2adb4f17cd0dbcb76b1b9709630aed77d1aa71d465917fde1b

    • Size

      1.8MB

    • MD5

      0982abc196688fa6faf5306f9ece4f3c

    • SHA1

      d9c32fb8547400bf00443421643fc5a381cf4403

    • SHA256

      80d87ae4cea90c2adb4f17cd0dbcb76b1b9709630aed77d1aa71d465917fde1b

    • SHA512

      754cbe9cd70ef6c10fa69b0b80b755260f965694de5b3fb86890e49e23505de9fbbe39f45bb1bcd000c309baa868a81a61d168e314a5152fc3b2ade9cc8a0738

    • SSDEEP

      12288:5UzTnjuWv0jtUgQ8RSG6FaavfQ/DxU61MIt3dYA7W2FeDSIGVH/KIDgDgUeHbY1I:5HHjWHHaavUuiQDbGV6eH8tk/

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks