General

  • Target

    96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N

  • Size

    2.9MB

  • Sample

    241111-dzpm2svpbp

  • MD5

    fad1f55e473ce8bb0992f7aac9541280

  • SHA1

    c2dba04ca0b8ac04f673d45f8c3244d0af5eb2a4

  • SHA256

    96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39

  • SHA512

    d5c1e30c5b9a555e9bb16a1d742c6b343778ed934ccbf5181ddc537935104e6d7dd4ec29564f79179d1a84f3b668cf9e610f97865c02d96185c3757e41cc7f91

  • SSDEEP

    24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHN:7v97AXmw4gxeOw46fUbNecCCFbNecO

Malware Config

Targets

    • Target

      96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39N

    • Size

      2.9MB

    • MD5

      fad1f55e473ce8bb0992f7aac9541280

    • SHA1

      c2dba04ca0b8ac04f673d45f8c3244d0af5eb2a4

    • SHA256

      96a8236dcc4bd2a392a82075f38327843610b5d86d2ef1095afcf8b461e58c39

    • SHA512

      d5c1e30c5b9a555e9bb16a1d742c6b343778ed934ccbf5181ddc537935104e6d7dd4ec29564f79179d1a84f3b668cf9e610f97865c02d96185c3757e41cc7f91

    • SSDEEP

      24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHN:7v97AXmw4gxeOw46fUbNecCCFbNecO

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks