General

  • Target

    8a44cb2f3077671a92501b6ac58e7a766c76cd769d1f302062c0d6a248b7f3c4

  • Size

    1.8MB

  • Sample

    250112-dvrxlstpat

  • MD5

    d65f71a8555441a3b7a668c6d7ca6753

  • SHA1

    af6cb4504bfeefdbc1ca6343a9dc10ee0de945ff

  • SHA256

    8a44cb2f3077671a92501b6ac58e7a766c76cd769d1f302062c0d6a248b7f3c4

  • SHA512

    56ebf5cb98f4c4bdb3cf9a56f715c230ff2e52a89d158cec551b160d2fb44795ed83df13fe9e3116e455a029a7d50f23f65fab354cb43dd1159d3cbb66b60340

  • SSDEEP

    12288:Q99Vbpgx4OuE+aCpBPY0PkI686WNUfWO6yuXzT5SPlSG9dA7W2FeDSIGVH/KIDg5:k1gg4CppEI6GGfWDkMQDbGV6eH8tkq

Malware Config

Targets

    • Target

      8a44cb2f3077671a92501b6ac58e7a766c76cd769d1f302062c0d6a248b7f3c4

    • Size

      1.8MB

    • MD5

      d65f71a8555441a3b7a668c6d7ca6753

    • SHA1

      af6cb4504bfeefdbc1ca6343a9dc10ee0de945ff

    • SHA256

      8a44cb2f3077671a92501b6ac58e7a766c76cd769d1f302062c0d6a248b7f3c4

    • SHA512

      56ebf5cb98f4c4bdb3cf9a56f715c230ff2e52a89d158cec551b160d2fb44795ed83df13fe9e3116e455a029a7d50f23f65fab354cb43dd1159d3cbb66b60340

    • SSDEEP

      12288:Q99Vbpgx4OuE+aCpBPY0PkI686WNUfWO6yuXzT5SPlSG9dA7W2FeDSIGVH/KIDg5:k1gg4CppEI6GGfWDkMQDbGV6eH8tkq

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks