General

  • Target

    41fda302e04fdb55b5ac8380a3c6a19802e32805f8c4c5b14afb825baeb569a5

  • Size

    2.9MB

  • Sample

    250114-3j4jpstjfx

  • MD5

    043d115192d2114dfc80638fb0c59a47

  • SHA1

    687fd88c1f11e47beba0419002d9fa85eb275fc6

  • SHA256

    41fda302e04fdb55b5ac8380a3c6a19802e32805f8c4c5b14afb825baeb569a5

  • SHA512

    aaee4527c160eb9108ecc8d8e9bf436d3db7a13ed8f2875c8d95f9cea7d115ff301e3b4950ddda3b462d22beeb90e735d269fae024b0d59d81fb984edcc7f571

  • SSDEEP

    24576:eTy7ASmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHS:eTy7ASmw4gxeOw46fUbNecCCFbNecL

Malware Config

Targets

    • Target

      41fda302e04fdb55b5ac8380a3c6a19802e32805f8c4c5b14afb825baeb569a5

    • Size

      2.9MB

    • MD5

      043d115192d2114dfc80638fb0c59a47

    • SHA1

      687fd88c1f11e47beba0419002d9fa85eb275fc6

    • SHA256

      41fda302e04fdb55b5ac8380a3c6a19802e32805f8c4c5b14afb825baeb569a5

    • SHA512

      aaee4527c160eb9108ecc8d8e9bf436d3db7a13ed8f2875c8d95f9cea7d115ff301e3b4950ddda3b462d22beeb90e735d269fae024b0d59d81fb984edcc7f571

    • SSDEEP

      24576:eTy7ASmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHS:eTy7ASmw4gxeOw46fUbNecCCFbNecL

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks