General

  • Target

    a46ef15ab8f68de250213a96ad55d476e7f66d8283515c780b35ecfa202a0838N.exe

  • Size

    2.9MB

  • Sample

    250116-nwfwvaymbw

  • MD5

    d1bdeb99a7de91db95783d0f4af6c6d0

  • SHA1

    34772f37c36d0a821bc3860c0fa2d4b858f52650

  • SHA256

    a46ef15ab8f68de250213a96ad55d476e7f66d8283515c780b35ecfa202a0838

  • SHA512

    06150bfde172ebe24bbc57676d19411644df9de0367c595caef71ed7a15963d59adb3208a9a011eed836db08e470c660f717a6d9d4f5ff8f2bb3942579a76012

  • SSDEEP

    24576:eTy7ASmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHJ:eTy7ASmw4gxeOw46fUbNecCCFbNecu

Malware Config

Targets

    • Target

      a46ef15ab8f68de250213a96ad55d476e7f66d8283515c780b35ecfa202a0838N.exe

    • Size

      2.9MB

    • MD5

      d1bdeb99a7de91db95783d0f4af6c6d0

    • SHA1

      34772f37c36d0a821bc3860c0fa2d4b858f52650

    • SHA256

      a46ef15ab8f68de250213a96ad55d476e7f66d8283515c780b35ecfa202a0838

    • SHA512

      06150bfde172ebe24bbc57676d19411644df9de0367c595caef71ed7a15963d59adb3208a9a011eed836db08e470c660f717a6d9d4f5ff8f2bb3942579a76012

    • SSDEEP

      24576:eTy7ASmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHJ:eTy7ASmw4gxeOw46fUbNecCCFbNecu

    • Modifies WinLogon for persistence

    • Modifies visiblity of hidden/system files in Explorer

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzonerat family

    • Warzone RAT payload

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks