General

  • Target

    710458837fdf6074aff901da8624536ba35a5a86d81037f8f1e19fd0227290dbN.exe

  • Size

    8.9MB

  • Sample

    241222-ems1daspey

  • MD5

    7166f200a4c14758fb2f950cf755b910

  • SHA1

    72a52a35cb848bfc6d9d94d2b462f82e595c2a7b

  • SHA256

    710458837fdf6074aff901da8624536ba35a5a86d81037f8f1e19fd0227290db

  • SHA512

    cfff1daa7880fd67ef580238f0e05921c6638177a4aa14ec1e35a1f08e4d8df99b5d7f3367bd81f5e57193fd2e4de83a463f2fa8d09e7d066f7cf496217c3fc9

  • SSDEEP

    49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNec+:K1+8e8e8f8e8e8X

Malware Config

Targets

    • Target

      710458837fdf6074aff901da8624536ba35a5a86d81037f8f1e19fd0227290dbN.exe

    • Size

      8.9MB

    • MD5

      7166f200a4c14758fb2f950cf755b910

    • SHA1

      72a52a35cb848bfc6d9d94d2b462f82e595c2a7b

    • SHA256

      710458837fdf6074aff901da8624536ba35a5a86d81037f8f1e19fd0227290db

    • SHA512

      cfff1daa7880fd67ef580238f0e05921c6638177a4aa14ec1e35a1f08e4d8df99b5d7f3367bd81f5e57193fd2e4de83a463f2fa8d09e7d066f7cf496217c3fc9

    • SSDEEP

      49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNec+:K1+8e8e8f8e8e8X

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks