General

  • Target

    e2cf4c2c908c6b065328e1b97c08f537eca63830d21a748e1487a0d3f64bb377N

  • Size

    3.9MB

  • Sample

    241110-r8d5kayerq

  • MD5

    f1d4d891452542bcf4082024cda838b0

  • SHA1

    df9e0f863a644b91fade2eb4e5f192d5fbcce2c3

  • SHA256

    e2cf4c2c908c6b065328e1b97c08f537eca63830d21a748e1487a0d3f64bb377

  • SHA512

    e94d958c18af4df98c1570603124c8425b38323aa093efda6620fe3dd83620e47bec91e289aaa21f548b1d5f1514f1f3a02bdfb06d6e6ca71a067764b373bfba

  • SSDEEP

    24576:GIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDn:7C0bNechC0bNechC0bNecv

Malware Config

Targets

    • Target

      e2cf4c2c908c6b065328e1b97c08f537eca63830d21a748e1487a0d3f64bb377N

    • Size

      3.9MB

    • MD5

      f1d4d891452542bcf4082024cda838b0

    • SHA1

      df9e0f863a644b91fade2eb4e5f192d5fbcce2c3

    • SHA256

      e2cf4c2c908c6b065328e1b97c08f537eca63830d21a748e1487a0d3f64bb377

    • SHA512

      e94d958c18af4df98c1570603124c8425b38323aa093efda6620fe3dd83620e47bec91e289aaa21f548b1d5f1514f1f3a02bdfb06d6e6ca71a067764b373bfba

    • SSDEEP

      24576:GIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0GoWQDn:7C0bNechC0bNechC0bNecv

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks