General

  • Target

    8321d09671aa81c814d17c4b9940808f87ecce22f183e006881473024e1e7745N

  • Size

    1.8MB

  • Sample

    241109-fxca2sxnhy

  • MD5

    b64ef098c0b51da29edd129091c2d780

  • SHA1

    d15f5beebd11297a0d374b2d88fb6ffd9a27f777

  • SHA256

    8321d09671aa81c814d17c4b9940808f87ecce22f183e006881473024e1e7745

  • SHA512

    f9c15d59c26782e391e313198afc599c87c18349f5e9bf87ed60ce82a9a5e4ad2fd3c1127418c02318851a46523ff9301e1e9b32f0f2ad6907d80636248a5fcd

  • SSDEEP

    12288:BUrjP8Xuc2UY0B8TIwDDMistJ6gicRzubSFJeOgTpBA7W2FeDSIGVH/KIDgDgUej:ujjSYIUDJ86giGTPQDbGV6eH81k/

Malware Config

Targets

    • Target

      8321d09671aa81c814d17c4b9940808f87ecce22f183e006881473024e1e7745N

    • Size

      1.8MB

    • MD5

      b64ef098c0b51da29edd129091c2d780

    • SHA1

      d15f5beebd11297a0d374b2d88fb6ffd9a27f777

    • SHA256

      8321d09671aa81c814d17c4b9940808f87ecce22f183e006881473024e1e7745

    • SHA512

      f9c15d59c26782e391e313198afc599c87c18349f5e9bf87ed60ce82a9a5e4ad2fd3c1127418c02318851a46523ff9301e1e9b32f0f2ad6907d80636248a5fcd

    • SSDEEP

      12288:BUrjP8Xuc2UY0B8TIwDDMistJ6gicRzubSFJeOgTpBA7W2FeDSIGVH/KIDgDgUej:ujjSYIUDJ86giGTPQDbGV6eH81k/

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks