General

  • Target

    b9b687613e9611caa1fe4a0ad4005706467c691243c7e34fc2149e597ca5d714

  • Size

    2.9MB

  • Sample

    250106-g47wza1laq

  • MD5

    9818c8e2ed3bfdd471008e14d6a4e169

  • SHA1

    56db13538a458615ae030fbae3043a1f81a48478

  • SHA256

    b9b687613e9611caa1fe4a0ad4005706467c691243c7e34fc2149e597ca5d714

  • SHA512

    e0fa0570f2af8c6ff77f1d3bc904fb09dafcdb2d92dab14e1d5a8c18b80c9fe98e141b2145ea89265e3cc5036b6c495c02fd9dce0ac942265d50d3cd65f47940

  • SSDEEP

    24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHN:ATU7AAmw4gxeOw46fUbNecCCFbNecK

Malware Config

Targets

    • Target

      b9b687613e9611caa1fe4a0ad4005706467c691243c7e34fc2149e597ca5d714

    • Size

      2.9MB

    • MD5

      9818c8e2ed3bfdd471008e14d6a4e169

    • SHA1

      56db13538a458615ae030fbae3043a1f81a48478

    • SHA256

      b9b687613e9611caa1fe4a0ad4005706467c691243c7e34fc2149e597ca5d714

    • SHA512

      e0fa0570f2af8c6ff77f1d3bc904fb09dafcdb2d92dab14e1d5a8c18b80c9fe98e141b2145ea89265e3cc5036b6c495c02fd9dce0ac942265d50d3cd65f47940

    • SSDEEP

      24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHN:ATU7AAmw4gxeOw46fUbNecCCFbNecK

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks