General

  • Target

    ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9

  • Size

    8.2MB

  • Sample

    241202-fj3k3swkgr

  • MD5

    87f8189455bf33a4a0b16b16f444069f

  • SHA1

    e5b7f2d614929fc8d0964eab9ae80b3f3e486d59

  • SHA256

    ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9

  • SHA512

    d31a66a02b6355ca7f841fcba388b9e8e49aad37b77f6c1be2a2728939de0941bac2c94646528c5e069ce41f42c433152bc6641b8cac2abd1de5e7b7d6221fad

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecw:V8e8e8f8e8e8n

Malware Config

Targets

    • Target

      ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9

    • Size

      8.2MB

    • MD5

      87f8189455bf33a4a0b16b16f444069f

    • SHA1

      e5b7f2d614929fc8d0964eab9ae80b3f3e486d59

    • SHA256

      ff147c7568a96c58adaedb4164bec2feda7abb98f8d092d2ae7b834ce53b31c9

    • SHA512

      d31a66a02b6355ca7f841fcba388b9e8e49aad37b77f6c1be2a2728939de0941bac2c94646528c5e069ce41f42c433152bc6641b8cac2abd1de5e7b7d6221fad

    • SSDEEP

      49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecw:V8e8e8f8e8e8n

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks