General

  • Target

    3e770bb7f9b4a4ffa6bb38e4520b35c038656ffa55bcb6f754c6949e2720b4a8

  • Size

    8.9MB

  • Sample

    241124-1rpz6s1qdy

  • MD5

    f73729447e15dd780e6e84016fdffb3d

  • SHA1

    d0bf3582cb363f96d67fd7eee3383335927288fd

  • SHA256

    3e770bb7f9b4a4ffa6bb38e4520b35c038656ffa55bcb6f754c6949e2720b4a8

  • SHA512

    e9497d9c20f79bb76d2ca00894b46545a8c927591bca4a3362cf66da46d6b82e8f041007b6ac7b5b312161c3592f945ad82f545978d38bd50c3530990496178b

  • SSDEEP

    49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecU:K1+8e8e8f8e8e8L

Malware Config

Targets

    • Target

      3e770bb7f9b4a4ffa6bb38e4520b35c038656ffa55bcb6f754c6949e2720b4a8

    • Size

      8.9MB

    • MD5

      f73729447e15dd780e6e84016fdffb3d

    • SHA1

      d0bf3582cb363f96d67fd7eee3383335927288fd

    • SHA256

      3e770bb7f9b4a4ffa6bb38e4520b35c038656ffa55bcb6f754c6949e2720b4a8

    • SHA512

      e9497d9c20f79bb76d2ca00894b46545a8c927591bca4a3362cf66da46d6b82e8f041007b6ac7b5b312161c3592f945ad82f545978d38bd50c3530990496178b

    • SSDEEP

      49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecU:K1+8e8e8f8e8e8L

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks