General

  • Target

    17f72cef60c40492ad8f86a4f4aedb05a8f7384a6364bdb20bba6f9c124dae07N.exe

  • Size

    2.9MB

  • Sample

    250104-hml4lsxqbx

  • MD5

    250a4ca15e86eec73c2960c718b395a0

  • SHA1

    455df2cf1a7bee9077773f15ae0f6729db09f8bc

  • SHA256

    17f72cef60c40492ad8f86a4f4aedb05a8f7384a6364bdb20bba6f9c124dae07

  • SHA512

    572de7269df775ff665baad03477d6d6c71de2e00c7640c38d5309558f4147a19a3e3d96361cbc1a263918ac20a15097f78fb8bcf20d2ee6ae050f892612a852

  • SSDEEP

    24576:eTy7ASmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHR:eTy7ASmw4gxeOw46fUbNecCCFbNecy

Malware Config

Targets

    • Target

      17f72cef60c40492ad8f86a4f4aedb05a8f7384a6364bdb20bba6f9c124dae07N.exe

    • Size

      2.9MB

    • MD5

      250a4ca15e86eec73c2960c718b395a0

    • SHA1

      455df2cf1a7bee9077773f15ae0f6729db09f8bc

    • SHA256

      17f72cef60c40492ad8f86a4f4aedb05a8f7384a6364bdb20bba6f9c124dae07

    • SHA512

      572de7269df775ff665baad03477d6d6c71de2e00c7640c38d5309558f4147a19a3e3d96361cbc1a263918ac20a15097f78fb8bcf20d2ee6ae050f892612a852

    • SSDEEP

      24576:eTy7ASmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHR:eTy7ASmw4gxeOw46fUbNecCCFbNecy

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks