General

  • Target

    c07873a3bbb337ed71a5444614f1491f236002741c7b617eab2ab71bce44097a

  • Size

    1.8MB

  • Sample

    241201-devnkayqdq

  • MD5

    15360f4a22ad749ab5e005de63ed184c

  • SHA1

    bccae44a9e77b863143780ad5bc6512d50ef573d

  • SHA256

    c07873a3bbb337ed71a5444614f1491f236002741c7b617eab2ab71bce44097a

  • SHA512

    e81b417998c7bafeb2d569820a8851621aaa8bc23542e2a4ec4f6e500ba667ac78dcee31c9e1c7cf3a5537e54105ce3c3824a62dc6f1d24ccb425bab77f0e78c

  • SSDEEP

    12288:i254f/VAuj79umm3xR0lq+X6kOyeXiYxewRJBWW59qA7W2FeDSIGVH/KIDgDgUef:x+D9uVMpjOyerrFQDbGV6eH81kz

Malware Config

Targets

    • Target

      c07873a3bbb337ed71a5444614f1491f236002741c7b617eab2ab71bce44097a

    • Size

      1.8MB

    • MD5

      15360f4a22ad749ab5e005de63ed184c

    • SHA1

      bccae44a9e77b863143780ad5bc6512d50ef573d

    • SHA256

      c07873a3bbb337ed71a5444614f1491f236002741c7b617eab2ab71bce44097a

    • SHA512

      e81b417998c7bafeb2d569820a8851621aaa8bc23542e2a4ec4f6e500ba667ac78dcee31c9e1c7cf3a5537e54105ce3c3824a62dc6f1d24ccb425bab77f0e78c

    • SSDEEP

      12288:i254f/VAuj79umm3xR0lq+X6kOyeXiYxewRJBWW59qA7W2FeDSIGVH/KIDgDgUef:x+D9uVMpjOyerrFQDbGV6eH81kz

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks