General

  • Target

    87290a122227a323a441974647abfd13bacf1aac40d7402145308a6488bea2a3N.exe

  • Size

    8.9MB

  • Sample

    241218-f91t6svqat

  • MD5

    4f507f36390e3941405eff5cf37e0170

  • SHA1

    15a9717df6aff646c864ec33f68c01559ca0f789

  • SHA256

    87290a122227a323a441974647abfd13bacf1aac40d7402145308a6488bea2a3

  • SHA512

    ae6856da286ecab25c233fad180e4c01996bfb744a149ef424637fffc2f69cfce6269fc735609f09ef77aacdab30e1370505956e22709fc5d99a20274abe9bea

  • SSDEEP

    49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecR:K1+8e8e8f8e8e8s

Malware Config

Targets

    • Target

      87290a122227a323a441974647abfd13bacf1aac40d7402145308a6488bea2a3N.exe

    • Size

      8.9MB

    • MD5

      4f507f36390e3941405eff5cf37e0170

    • SHA1

      15a9717df6aff646c864ec33f68c01559ca0f789

    • SHA256

      87290a122227a323a441974647abfd13bacf1aac40d7402145308a6488bea2a3

    • SHA512

      ae6856da286ecab25c233fad180e4c01996bfb744a149ef424637fffc2f69cfce6269fc735609f09ef77aacdab30e1370505956e22709fc5d99a20274abe9bea

    • SSDEEP

      49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecR:K1+8e8e8f8e8e8s

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks