General

  • Target

    dcb866ae7c2b6c676ea247cfff685e7c63791beb80c6c37a96cefb95af3ee0ecN.exe

  • Size

    8.2MB

  • Sample

    241203-dtb5rsxmfy

  • MD5

    eb52abc1455500d88c5be15fdf6ee840

  • SHA1

    7bf903b41e613889012c2bfe35b980f161a92910

  • SHA256

    dcb866ae7c2b6c676ea247cfff685e7c63791beb80c6c37a96cefb95af3ee0ec

  • SHA512

    76784766311c2f569e0f797a086a18af1e5f791a3af66ff5407ddb3ccedd80e4b5093a3980d45731573df15fd025c6811e9e28a0d8e9efcf2872288b5e8b6794

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecx:V8e8e8f8e8e8K

Malware Config

Targets

    • Target

      dcb866ae7c2b6c676ea247cfff685e7c63791beb80c6c37a96cefb95af3ee0ecN.exe

    • Size

      8.2MB

    • MD5

      eb52abc1455500d88c5be15fdf6ee840

    • SHA1

      7bf903b41e613889012c2bfe35b980f161a92910

    • SHA256

      dcb866ae7c2b6c676ea247cfff685e7c63791beb80c6c37a96cefb95af3ee0ec

    • SHA512

      76784766311c2f569e0f797a086a18af1e5f791a3af66ff5407ddb3ccedd80e4b5093a3980d45731573df15fd025c6811e9e28a0d8e9efcf2872288b5e8b6794

    • SSDEEP

      49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecx:V8e8e8f8e8e8K

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks