General

  • Target

    b877ee81fc5b591a2ebb0e889cd05a1ce6eafe2f3af84607830635b37e97c362N

  • Size

    8.9MB

  • Sample

    241108-el419axnhj

  • MD5

    a43475a490d5ab4b84b9f4bdb9dd2320

  • SHA1

    d33587da3e087df1976247128834ea4bcb92df44

  • SHA256

    b877ee81fc5b591a2ebb0e889cd05a1ce6eafe2f3af84607830635b37e97c362

  • SHA512

    51783a8566d768a05c22e37fa0df90327cd8140b753b8704a703c6df18cda97de2e0a9bae1a179511945240cff5ee33b9f09d27ea5b7f5958960d7d6b7e9fd83

  • SSDEEP

    49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecf:K1+8e8e8f8e8e82

Malware Config

Targets

    • Target

      b877ee81fc5b591a2ebb0e889cd05a1ce6eafe2f3af84607830635b37e97c362N

    • Size

      8.9MB

    • MD5

      a43475a490d5ab4b84b9f4bdb9dd2320

    • SHA1

      d33587da3e087df1976247128834ea4bcb92df44

    • SHA256

      b877ee81fc5b591a2ebb0e889cd05a1ce6eafe2f3af84607830635b37e97c362

    • SHA512

      51783a8566d768a05c22e37fa0df90327cd8140b753b8704a703c6df18cda97de2e0a9bae1a179511945240cff5ee33b9f09d27ea5b7f5958960d7d6b7e9fd83

    • SSDEEP

      49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecf:K1+8e8e8f8e8e82

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks