General

  • Target

    40d6c7de45ca9c7d1bb49646ee52877d0e98d2f11e6fbdb855d731d92cf6e82bN.exe

  • Size

    1.8MB

  • Sample

    241219-dspdpswldl

  • MD5

    69b2e49d12f1046d8e443a86caf02fe0

  • SHA1

    038f270ced4c6f4f092fd950f1b565fedc8ec829

  • SHA256

    40d6c7de45ca9c7d1bb49646ee52877d0e98d2f11e6fbdb855d731d92cf6e82b

  • SHA512

    5d5d0fbe25b5c2deccc8f55129c3f27e65ed517effc22000187270bfd6fd932171b667e617dcff23ab2b943a38b759e2ba6cba0d1676911a48e5b782fb9b81e0

  • SSDEEP

    12288:i254f/VAuj79umm3xR0lq+X6kOyeXiYxewRJBWW59qA7W2FeDSIGVH/KIDgDgUe0:x+D9uVMpjOyerrFQDbGV6eH81kg

Malware Config

Targets

    • Target

      40d6c7de45ca9c7d1bb49646ee52877d0e98d2f11e6fbdb855d731d92cf6e82bN.exe

    • Size

      1.8MB

    • MD5

      69b2e49d12f1046d8e443a86caf02fe0

    • SHA1

      038f270ced4c6f4f092fd950f1b565fedc8ec829

    • SHA256

      40d6c7de45ca9c7d1bb49646ee52877d0e98d2f11e6fbdb855d731d92cf6e82b

    • SHA512

      5d5d0fbe25b5c2deccc8f55129c3f27e65ed517effc22000187270bfd6fd932171b667e617dcff23ab2b943a38b759e2ba6cba0d1676911a48e5b782fb9b81e0

    • SSDEEP

      12288:i254f/VAuj79umm3xR0lq+X6kOyeXiYxewRJBWW59qA7W2FeDSIGVH/KIDgDgUe0:x+D9uVMpjOyerrFQDbGV6eH81kg

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks