General

  • Target

    22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe

  • Size

    8.2MB

  • Sample

    241206-dlg12stjal

  • MD5

    5b38b3b2a571a945db7ef36cedf360a0

  • SHA1

    d8c31282b5842d0a4c8c4842c70690e52a79b700

  • SHA256

    22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edc

  • SHA512

    7f053766692102ab9aa74e5daa2253649b4abdf407702bb9685f4c0d4dfb324d90a4d687578d4e264be502c894e3f91a80a2e7087dda453ff1a29166bdebf57f

  • SSDEEP

    49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecH:V8e8e8f8e8e8Y

Malware Config

Targets

    • Target

      22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edcN.exe

    • Size

      8.2MB

    • MD5

      5b38b3b2a571a945db7ef36cedf360a0

    • SHA1

      d8c31282b5842d0a4c8c4842c70690e52a79b700

    • SHA256

      22d2fcaf768cad0239276f9f52b2709b434282c393aa864509767b50b1857edc

    • SHA512

      7f053766692102ab9aa74e5daa2253649b4abdf407702bb9685f4c0d4dfb324d90a4d687578d4e264be502c894e3f91a80a2e7087dda453ff1a29166bdebf57f

    • SSDEEP

      49152:7C0bNechC0bNechC0bNecIC0bNechC0bNechC0bNecH:V8e8e8f8e8e8Y

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks