General

  • Target

    fd73487d66a8ede05e79e064e0fda1bed47fa961e5522db3238801c5a3f01fba

  • Size

    2.9MB

  • Sample

    241115-ek8ytayepn

  • MD5

    8a1f8c2808b91865a87bf8f6079b9c6d

  • SHA1

    08567293c999fa221ed3b3c6ea2ce0734d886c44

  • SHA256

    fd73487d66a8ede05e79e064e0fda1bed47fa961e5522db3238801c5a3f01fba

  • SHA512

    8c76e4c79e15041f15a59cc314c7e990362adab8d6d612c907aa49961785fc0d3b6e27c7f4b2feff4b7abfa956a491e361bcd9fd164a03a568c2526619a81416

  • SSDEEP

    24576:eTy7ASmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH/:eTy7ASmw4gxeOw46fUbNecCCFbNecY

Malware Config

Targets

    • Target

      fd73487d66a8ede05e79e064e0fda1bed47fa961e5522db3238801c5a3f01fba

    • Size

      2.9MB

    • MD5

      8a1f8c2808b91865a87bf8f6079b9c6d

    • SHA1

      08567293c999fa221ed3b3c6ea2ce0734d886c44

    • SHA256

      fd73487d66a8ede05e79e064e0fda1bed47fa961e5522db3238801c5a3f01fba

    • SHA512

      8c76e4c79e15041f15a59cc314c7e990362adab8d6d612c907aa49961785fc0d3b6e27c7f4b2feff4b7abfa956a491e361bcd9fd164a03a568c2526619a81416

    • SSDEEP

      24576:eTy7ASmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH/:eTy7ASmw4gxeOw46fUbNecCCFbNecY

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks