General

  • Target

    474ae9ff7dcfbd25c34dee2ba7a17d95d58fef472b9d2e4b90b3df03252a338e

  • Size

    8.9MB

  • Sample

    241203-1wwcrasjfr

  • MD5

    eb46f3abcc1e78dd84fc18da3dfe58df

  • SHA1

    3dbd4f048aa87d6689ec14af4e7c00660f282838

  • SHA256

    474ae9ff7dcfbd25c34dee2ba7a17d95d58fef472b9d2e4b90b3df03252a338e

  • SHA512

    760da4e0e294db579f8adeced67b2e00bad0fa9f9b62467b7818c070c03d9746282cf8ab885002124dec211fe8a721fcfc32eb9f46b040a4648facbaf8dc68ee

  • SSDEEP

    49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecs:K1+8e8e8f8e8e8l

Malware Config

Targets

    • Target

      474ae9ff7dcfbd25c34dee2ba7a17d95d58fef472b9d2e4b90b3df03252a338e

    • Size

      8.9MB

    • MD5

      eb46f3abcc1e78dd84fc18da3dfe58df

    • SHA1

      3dbd4f048aa87d6689ec14af4e7c00660f282838

    • SHA256

      474ae9ff7dcfbd25c34dee2ba7a17d95d58fef472b9d2e4b90b3df03252a338e

    • SHA512

      760da4e0e294db579f8adeced67b2e00bad0fa9f9b62467b7818c070c03d9746282cf8ab885002124dec211fe8a721fcfc32eb9f46b040a4648facbaf8dc68ee

    • SSDEEP

      49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecs:K1+8e8e8f8e8e8l

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks