General

  • Target

    bcaf77de590c3922073d85cf3fbfc7e6d241626d9689f460ad39b6474fc44733N.exe

  • Size

    1.2MB

  • Sample

    250115-2453layqds

  • MD5

    3c2f155d796b72a5629cbe93ad566f10

  • SHA1

    7ea30257ee16360f5b7b7f9b10f17b07dc0443cb

  • SHA256

    bcaf77de590c3922073d85cf3fbfc7e6d241626d9689f460ad39b6474fc44733

  • SHA512

    ac3ded812fca69839349259abc18ce3f7477e5d9ee1868ff7801c41b2a5adb0af754330c893e1f6ad277d1570fea890e54d3f469aaf320cd2d5d57630ad88b81

  • SSDEEP

    12288:OIbsBDU0I6+Tu0TJ0N1oYgNOFDA7W2FeDSIGVH/KIDgDgUeHbY11kO:OIbGD2JTu0GoZQDbGV6eH81kO

Malware Config

Targets

    • Target

      bcaf77de590c3922073d85cf3fbfc7e6d241626d9689f460ad39b6474fc44733N.exe

    • Size

      1.2MB

    • MD5

      3c2f155d796b72a5629cbe93ad566f10

    • SHA1

      7ea30257ee16360f5b7b7f9b10f17b07dc0443cb

    • SHA256

      bcaf77de590c3922073d85cf3fbfc7e6d241626d9689f460ad39b6474fc44733

    • SHA512

      ac3ded812fca69839349259abc18ce3f7477e5d9ee1868ff7801c41b2a5adb0af754330c893e1f6ad277d1570fea890e54d3f469aaf320cd2d5d57630ad88b81

    • SSDEEP

      12288:OIbsBDU0I6+Tu0TJ0N1oYgNOFDA7W2FeDSIGVH/KIDgDgUeHbY11kO:OIbGD2JTu0GoZQDbGV6eH81kO

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks