General

  • Target

    fb147c55accd61e648f983409c3801c66a0510448d04fad07a63aac7585f2512

  • Size

    1.8MB

  • Sample

    250104-j5z9masreq

  • MD5

    5cd14194c6bfef7f10945136ba7de89e

  • SHA1

    c67411791f604c1aec3d0ae915179e171184e174

  • SHA256

    fb147c55accd61e648f983409c3801c66a0510448d04fad07a63aac7585f2512

  • SHA512

    a2adbe82aeeeb0759e2d096e8f9f68176cf09448d27dbb33bbb797db69a3c052328fd2aa57f55665abedd1c87af419a3fe57257b7554578b1dc952f60b2c94b0

  • SSDEEP

    12288:BUrjP8Xuc2UY0B8TIwDDMistJ6gicRzubSFJeOgTpBA7W2FeDSIGVH/KIDgDgUeg:ujjSYIUDJ86giGTPQDbGV6eH81kM

Malware Config

Targets

    • Target

      fb147c55accd61e648f983409c3801c66a0510448d04fad07a63aac7585f2512

    • Size

      1.8MB

    • MD5

      5cd14194c6bfef7f10945136ba7de89e

    • SHA1

      c67411791f604c1aec3d0ae915179e171184e174

    • SHA256

      fb147c55accd61e648f983409c3801c66a0510448d04fad07a63aac7585f2512

    • SHA512

      a2adbe82aeeeb0759e2d096e8f9f68176cf09448d27dbb33bbb797db69a3c052328fd2aa57f55665abedd1c87af419a3fe57257b7554578b1dc952f60b2c94b0

    • SSDEEP

      12288:BUrjP8Xuc2UY0B8TIwDDMistJ6gicRzubSFJeOgTpBA7W2FeDSIGVH/KIDgDgUeg:ujjSYIUDJ86giGTPQDbGV6eH81kM

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks