General

  • Target

    3bb082a9ea468df4bd73d3ec7509812945e3a0058b70ba534314484f2d3a966d

  • Size

    1.8MB

  • Sample

    250105-2xextsyjhz

  • MD5

    74933c8ce709ae75b089440c4943b2be

  • SHA1

    f73d54b267a07c5005dfd642533c1e62ddbb8a9a

  • SHA256

    3bb082a9ea468df4bd73d3ec7509812945e3a0058b70ba534314484f2d3a966d

  • SHA512

    425caebf2a466c552c6c5f3d07a08e49ef5c27e22968d6d4830ef025dc41522da6d633ca90b2c20bf6fe51d65c955ec142e1bf51c3fd52a36c603eb30e03f3da

  • SSDEEP

    12288:BUrjP8Xuc2UY0B8TIwDDMistJ6gicRzubSFJeOgTpBA7W2FeDSIGVH/KIDgDgUey:ujjSYIUDJ86giGTPQDbGV6eH81kG

Malware Config

Targets

    • Target

      3bb082a9ea468df4bd73d3ec7509812945e3a0058b70ba534314484f2d3a966d

    • Size

      1.8MB

    • MD5

      74933c8ce709ae75b089440c4943b2be

    • SHA1

      f73d54b267a07c5005dfd642533c1e62ddbb8a9a

    • SHA256

      3bb082a9ea468df4bd73d3ec7509812945e3a0058b70ba534314484f2d3a966d

    • SHA512

      425caebf2a466c552c6c5f3d07a08e49ef5c27e22968d6d4830ef025dc41522da6d633ca90b2c20bf6fe51d65c955ec142e1bf51c3fd52a36c603eb30e03f3da

    • SSDEEP

      12288:BUrjP8Xuc2UY0B8TIwDDMistJ6gicRzubSFJeOgTpBA7W2FeDSIGVH/KIDgDgUey:ujjSYIUDJ86giGTPQDbGV6eH81kG

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks