General

  • Target

    39686a0c3812fd39915fb85f35622f00f56bc5a38530e2179b7f892bd4b58d72

  • Size

    8.8MB

  • Sample

    241205-z2qtsaslcw

  • MD5

    90f8e132b64a69ec5c283596f7407ca9

  • SHA1

    d5bbf3fa0f7ba5c7b250d154b51330d555e1a6c4

  • SHA256

    39686a0c3812fd39915fb85f35622f00f56bc5a38530e2179b7f892bd4b58d72

  • SHA512

    3194d55f21c7e257a4f6bc11a376f91f8ab873776ad69b803e9e1ce00645d326f41cdd01298137c4901ad35a54e0eb4bc4e7d1dbfa24f9df0af5fd765b677eda

  • SSDEEP

    49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecx:K1+8e8e8f8e8e8y

Malware Config

Targets

    • Target

      39686a0c3812fd39915fb85f35622f00f56bc5a38530e2179b7f892bd4b58d72

    • Size

      8.8MB

    • MD5

      90f8e132b64a69ec5c283596f7407ca9

    • SHA1

      d5bbf3fa0f7ba5c7b250d154b51330d555e1a6c4

    • SHA256

      39686a0c3812fd39915fb85f35622f00f56bc5a38530e2179b7f892bd4b58d72

    • SHA512

      3194d55f21c7e257a4f6bc11a376f91f8ab873776ad69b803e9e1ce00645d326f41cdd01298137c4901ad35a54e0eb4bc4e7d1dbfa24f9df0af5fd765b677eda

    • SSDEEP

      49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecx:K1+8e8e8f8e8e8y

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks