General

  • Target

    7a19623df13a0504836a8e3602b401003fd4d84176464b0c61b0e00facad0712

  • Size

    2.9MB

  • Sample

    250116-dhp79azleq

  • MD5

    abca69ed9e3569bd5e7653f8c78973a6

  • SHA1

    30cb0487efdf25b48880d48bcc39f1f24fcd7669

  • SHA256

    7a19623df13a0504836a8e3602b401003fd4d84176464b0c61b0e00facad0712

  • SHA512

    a0531656f3bec001d4374ed9b7845c6439cd066db23694215152ff6e261d4249d2c9910e0dcb53dcbb397d9286e2d6b1af9ef39beaa2e475379f4bff4f4ba216

  • SSDEEP

    24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHO:7v97AXmw4gxeOw46fUbNecCCFbNec9

Malware Config

Targets

    • Target

      7a19623df13a0504836a8e3602b401003fd4d84176464b0c61b0e00facad0712

    • Size

      2.9MB

    • MD5

      abca69ed9e3569bd5e7653f8c78973a6

    • SHA1

      30cb0487efdf25b48880d48bcc39f1f24fcd7669

    • SHA256

      7a19623df13a0504836a8e3602b401003fd4d84176464b0c61b0e00facad0712

    • SHA512

      a0531656f3bec001d4374ed9b7845c6439cd066db23694215152ff6e261d4249d2c9910e0dcb53dcbb397d9286e2d6b1af9ef39beaa2e475379f4bff4f4ba216

    • SSDEEP

      24576:7v97AXmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHO:7v97AXmw4gxeOw46fUbNecCCFbNec9

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks