General
-
Target
f87ceb5ddb869f6acff0808b6013c9ee
-
Size
1.2MB
-
Sample
201214-c2n9yv4n4x
-
MD5
f87ceb5ddb869f6acff0808b6013c9ee
-
SHA1
a683f891353f32a3074920820398587acae10574
-
SHA256
383e454e500270c8d52a637e3cb9270cce15be72ddb716635652eb264d394e8d
-
SHA512
d60c3a996c4fdf5bc21adc2e01d8dfa3ed7c6de23e360afb363f4b672a40fc008b299fbbf8ce7c7600b04bd0dcab5511af0329be58cbd0c71a94495269eb5d92
Static task
static1
Behavioral task
behavioral1
Sample
f87ceb5ddb869f6acff0808b6013c9ee.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
f87ceb5ddb869f6acff0808b6013c9ee.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
f87ceb5ddb869f6acff0808b6013c9ee
-
Size
1.2MB
-
MD5
f87ceb5ddb869f6acff0808b6013c9ee
-
SHA1
a683f891353f32a3074920820398587acae10574
-
SHA256
383e454e500270c8d52a637e3cb9270cce15be72ddb716635652eb264d394e8d
-
SHA512
d60c3a996c4fdf5bc21adc2e01d8dfa3ed7c6de23e360afb363f4b672a40fc008b299fbbf8ce7c7600b04bd0dcab5511af0329be58cbd0c71a94495269eb5d92
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-