General

  • Target

    081032bbe53daf5fac8a7d766e4e611b632c0c4691a8046295455aa64bb8dae1

  • Size

    8.9MB

  • Sample

    241113-x6bjjsxlhs

  • MD5

    763671722a8d4cbf10d5cfdb52b69e12

  • SHA1

    762e9a627f1068382050e3c6bb3fff7a8acc8eca

  • SHA256

    081032bbe53daf5fac8a7d766e4e611b632c0c4691a8046295455aa64bb8dae1

  • SHA512

    d365d9a9c80606fbd9f358acff5319340607b18e4839fe41b2f389f91d915ef4d0fdc314523d566a60eff178d52e45f03c697aedc8500744a68ac20c3d59a463

  • SSDEEP

    49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecR:K1+8e8e8f8e8e8S

Malware Config

Targets

    • Target

      081032bbe53daf5fac8a7d766e4e611b632c0c4691a8046295455aa64bb8dae1

    • Size

      8.9MB

    • MD5

      763671722a8d4cbf10d5cfdb52b69e12

    • SHA1

      762e9a627f1068382050e3c6bb3fff7a8acc8eca

    • SHA256

      081032bbe53daf5fac8a7d766e4e611b632c0c4691a8046295455aa64bb8dae1

    • SHA512

      d365d9a9c80606fbd9f358acff5319340607b18e4839fe41b2f389f91d915ef4d0fdc314523d566a60eff178d52e45f03c697aedc8500744a68ac20c3d59a463

    • SSDEEP

      49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecR:K1+8e8e8f8e8e8S

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks