General

  • Target

    2139bed4622ae4f2e4dae44899c830ebac577ffcbb623c30b089001e70783957N.exe

  • Size

    8.9MB

  • Sample

    241217-zr2tasxpdz

  • MD5

    a63a5476d8090aba3dc3e277366c0280

  • SHA1

    120c74a027a64c7aaa0226dd7f365a67e2af62b5

  • SHA256

    2139bed4622ae4f2e4dae44899c830ebac577ffcbb623c30b089001e70783957

  • SHA512

    b4b101d99c6ef9d356ea96a7ee7f259cf861a9760182ce7222f7ca0a8aae6d8972a0088013693c134db8e100e0dc20aca5fbb98834714fe36c55a2d164a985ca

  • SSDEEP

    49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecU:K1+8e8e8f8e8e8j

Malware Config

Targets

    • Target

      2139bed4622ae4f2e4dae44899c830ebac577ffcbb623c30b089001e70783957N.exe

    • Size

      8.9MB

    • MD5

      a63a5476d8090aba3dc3e277366c0280

    • SHA1

      120c74a027a64c7aaa0226dd7f365a67e2af62b5

    • SHA256

      2139bed4622ae4f2e4dae44899c830ebac577ffcbb623c30b089001e70783957

    • SHA512

      b4b101d99c6ef9d356ea96a7ee7f259cf861a9760182ce7222f7ca0a8aae6d8972a0088013693c134db8e100e0dc20aca5fbb98834714fe36c55a2d164a985ca

    • SSDEEP

      49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecU:K1+8e8e8f8e8e8j

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks