General

  • Target

    0d300c63e0f2b6b8f5ed4262797997e4a751bcf0dfb9465a318d93962077ecf0N.exe

  • Size

    1.8MB

  • Sample

    250116-ed6vwazqfs

  • MD5

    b170697262c77ce88b35b430a35be650

  • SHA1

    0d20c9da74339a2a69e7e834214475c8dc1de637

  • SHA256

    0d300c63e0f2b6b8f5ed4262797997e4a751bcf0dfb9465a318d93962077ecf0

  • SHA512

    5d62cb132605a2d97947d604d64676a80a71c8fd4a283408b1a2fc503fbdd71cb47aca6157f1752e8d45df91f6d14646b4ccc1b0cf3ae8728e942cc8b440abcb

  • SSDEEP

    12288:BUrjP8Xuc2UY0B8TIwDDMistJ6gicRzubSFJeOgTpBA7W2FeDSIGVH/KIDgDgUe0:ujjSYIUDJ86giGTPQDbGV6eH81k4

Malware Config

Targets

    • Target

      0d300c63e0f2b6b8f5ed4262797997e4a751bcf0dfb9465a318d93962077ecf0N.exe

    • Size

      1.8MB

    • MD5

      b170697262c77ce88b35b430a35be650

    • SHA1

      0d20c9da74339a2a69e7e834214475c8dc1de637

    • SHA256

      0d300c63e0f2b6b8f5ed4262797997e4a751bcf0dfb9465a318d93962077ecf0

    • SHA512

      5d62cb132605a2d97947d604d64676a80a71c8fd4a283408b1a2fc503fbdd71cb47aca6157f1752e8d45df91f6d14646b4ccc1b0cf3ae8728e942cc8b440abcb

    • SSDEEP

      12288:BUrjP8Xuc2UY0B8TIwDDMistJ6gicRzubSFJeOgTpBA7W2FeDSIGVH/KIDgDgUe0:ujjSYIUDJ86giGTPQDbGV6eH81k4

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks