General

  • Target

    6d04d9a25ff9e50904896f1a7d0be42c39f65e5549969a67d599a74b3a25fdd2N.exe

  • Size

    8.9MB

  • Sample

    241222-dmqpks1nhp

  • MD5

    cb0a94ed86ab20f37003888759ecedc0

  • SHA1

    da5ea5cd54bc9af434760d7c4bd09a7b07de2d14

  • SHA256

    6d04d9a25ff9e50904896f1a7d0be42c39f65e5549969a67d599a74b3a25fdd2

  • SHA512

    55b1720ebea1220eb0e91eae9bc14a6e47f2e9062db4fede95d9804fc3a7a70ea565b12f42e854c29368913c7ca0f758db4b2904634b657782b115d9fef2fb4f

  • SSDEEP

    49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecE:K1+8e8e8f8e8e89

Malware Config

Targets

    • Target

      6d04d9a25ff9e50904896f1a7d0be42c39f65e5549969a67d599a74b3a25fdd2N.exe

    • Size

      8.9MB

    • MD5

      cb0a94ed86ab20f37003888759ecedc0

    • SHA1

      da5ea5cd54bc9af434760d7c4bd09a7b07de2d14

    • SHA256

      6d04d9a25ff9e50904896f1a7d0be42c39f65e5549969a67d599a74b3a25fdd2

    • SHA512

      55b1720ebea1220eb0e91eae9bc14a6e47f2e9062db4fede95d9804fc3a7a70ea565b12f42e854c29368913c7ca0f758db4b2904634b657782b115d9fef2fb4f

    • SSDEEP

      49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNecE:K1+8e8e8f8e8e89

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks