General

  • Target

    842947611429aab641eb5ba1ec7a4f95be58320e24d862131ddc2ace433beaee

  • Size

    2.9MB

  • Sample

    250115-ef13eaznbv

  • MD5

    80a5d11403897e71333963a7055d233b

  • SHA1

    4e5a243787b0e1f806457ab39a2a8df78f576f67

  • SHA256

    842947611429aab641eb5ba1ec7a4f95be58320e24d862131ddc2ace433beaee

  • SHA512

    32c0e43e3962dd7762e83ad590e678a4ef93969bc36b5d53f5237ce069290ad896d3475fab12abed3b0726d14f29397ba93065a9f50d465e55bf8ca0017bc0b6

  • SSDEEP

    24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH2:ATU7AAmw4gxeOw46fUbNecCCFbNecn

Malware Config

Targets

    • Target

      842947611429aab641eb5ba1ec7a4f95be58320e24d862131ddc2ace433beaee

    • Size

      2.9MB

    • MD5

      80a5d11403897e71333963a7055d233b

    • SHA1

      4e5a243787b0e1f806457ab39a2a8df78f576f67

    • SHA256

      842947611429aab641eb5ba1ec7a4f95be58320e24d862131ddc2ace433beaee

    • SHA512

      32c0e43e3962dd7762e83ad590e678a4ef93969bc36b5d53f5237ce069290ad896d3475fab12abed3b0726d14f29397ba93065a9f50d465e55bf8ca0017bc0b6

    • SSDEEP

      24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH2:ATU7AAmw4gxeOw46fUbNecCCFbNecn

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks