General

  • Target

    63a617c8fce5e603f5cfda58020b9045e02e35e27a5641fd5d4c8ea2ff0498ccN.exe

  • Size

    8.9MB

  • Sample

    241222-tdaj1atjek

  • MD5

    318253f52526240a72f217cbce9ba080

  • SHA1

    a2003adbc53e36b1d33907c4c1cb997b175155ce

  • SHA256

    63a617c8fce5e603f5cfda58020b9045e02e35e27a5641fd5d4c8ea2ff0498cc

  • SHA512

    3b16785361a378257a96eadafff7948776105f201c51637f16718f1cdb904c00101950dad4114b04f4a77f39329ab8aae299e1c9ed8d50c4570eaa050e8d5c2e

  • SSDEEP

    49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNec6:K1+8e8e8f8e8e8D

Malware Config

Targets

    • Target

      63a617c8fce5e603f5cfda58020b9045e02e35e27a5641fd5d4c8ea2ff0498ccN.exe

    • Size

      8.9MB

    • MD5

      318253f52526240a72f217cbce9ba080

    • SHA1

      a2003adbc53e36b1d33907c4c1cb997b175155ce

    • SHA256

      63a617c8fce5e603f5cfda58020b9045e02e35e27a5641fd5d4c8ea2ff0498cc

    • SHA512

      3b16785361a378257a96eadafff7948776105f201c51637f16718f1cdb904c00101950dad4114b04f4a77f39329ab8aae299e1c9ed8d50c4570eaa050e8d5c2e

    • SSDEEP

      49152:K1XP6rPbNechC0bNechC0bNecIC0bNechC0bNechC0bNec6:K1+8e8e8f8e8e8D

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks