General

  • Target

    61093cc93a25f2c5c5539a0bd9f414a1199bd902888a1b563c4c025e5fb34fb5

  • Size

    2.9MB

  • Sample

    250106-b4mcdatram

  • MD5

    3e75a2eef146428dac72d99a3e74a6fb

  • SHA1

    77b22c0368d6a3723e3c507c376e9b5de42898c6

  • SHA256

    61093cc93a25f2c5c5539a0bd9f414a1199bd902888a1b563c4c025e5fb34fb5

  • SHA512

    d3cd1dc2e7ea60a1b19a4a204dd3a9275ef650f7e4efec97c049bec87addec763f633e20d538b40ae7d8f4d34fac76c20ee80fd8ea50e2e98c484c0b8befa242

  • SSDEEP

    24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHM:7v97AXmw4gxeOw46fUbNecCCFbNecd

Malware Config

Targets

    • Target

      61093cc93a25f2c5c5539a0bd9f414a1199bd902888a1b563c4c025e5fb34fb5

    • Size

      2.9MB

    • MD5

      3e75a2eef146428dac72d99a3e74a6fb

    • SHA1

      77b22c0368d6a3723e3c507c376e9b5de42898c6

    • SHA256

      61093cc93a25f2c5c5539a0bd9f414a1199bd902888a1b563c4c025e5fb34fb5

    • SHA512

      d3cd1dc2e7ea60a1b19a4a204dd3a9275ef650f7e4efec97c049bec87addec763f633e20d538b40ae7d8f4d34fac76c20ee80fd8ea50e2e98c484c0b8befa242

    • SSDEEP

      24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHM:7v97AXmw4gxeOw46fUbNecCCFbNecd

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks