General

  • Target

    e48faefa11f17fa9073056dda267fbfc9f94b1b820ee9b62e569758c2ab4ed01N.exe

  • Size

    8.2MB

  • Sample

    241206-adwbxsvrdr

  • MD5

    b6d37eb6b47813c679bde3d4bc6fc2e0

  • SHA1

    ad27fb0e1da7ce89ade7df96dd9ed647eab2c649

  • SHA256

    e48faefa11f17fa9073056dda267fbfc9f94b1b820ee9b62e569758c2ab4ed01

  • SHA512

    fb502039619e86a5fa1636116d66481fe0ad6dc73c1db291471f362acfea4afcaf593c89e73bbe8e1accdcf762c21fdcd47fbac6eb30acdb36946b95fa7286f2

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecS:V8e8e8f8e8e8n

Malware Config

Targets

    • Target

      e48faefa11f17fa9073056dda267fbfc9f94b1b820ee9b62e569758c2ab4ed01N.exe

    • Size

      8.2MB

    • MD5

      b6d37eb6b47813c679bde3d4bc6fc2e0

    • SHA1

      ad27fb0e1da7ce89ade7df96dd9ed647eab2c649

    • SHA256

      e48faefa11f17fa9073056dda267fbfc9f94b1b820ee9b62e569758c2ab4ed01

    • SHA512

      fb502039619e86a5fa1636116d66481fe0ad6dc73c1db291471f362acfea4afcaf593c89e73bbe8e1accdcf762c21fdcd47fbac6eb30acdb36946b95fa7286f2

    • SSDEEP

      49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecS:V8e8e8f8e8e8n

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks