General
-
Target
dc861ce845058409c19525c9928b84742465ce42f5c8ae821f518d582669540e
-
Size
1.2MB
-
Sample
210517-khmmll237x
-
MD5
522470db29dd1fec8b3543980178c9dc
-
SHA1
b6c47786e6c8484e6b2b5b6848fb6e3554d9dd60
-
SHA256
dc861ce845058409c19525c9928b84742465ce42f5c8ae821f518d582669540e
-
SHA512
8aa3b08d0ea1d1bb8ff968359639af808f81dd28d9b5197ef7107c77390e46fd82b9f830132c8d48ee34764b3b2cd95b52e24eb4b26c26cd454b6daa4de3e7b0
Static task
static1
Behavioral task
behavioral1
Sample
dc861ce845058409c19525c9928b84742465ce42f5c8ae821f518d582669540e.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
dc861ce845058409c19525c9928b84742465ce42f5c8ae821f518d582669540e.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
dc861ce845058409c19525c9928b84742465ce42f5c8ae821f518d582669540e
-
Size
1.2MB
-
MD5
522470db29dd1fec8b3543980178c9dc
-
SHA1
b6c47786e6c8484e6b2b5b6848fb6e3554d9dd60
-
SHA256
dc861ce845058409c19525c9928b84742465ce42f5c8ae821f518d582669540e
-
SHA512
8aa3b08d0ea1d1bb8ff968359639af808f81dd28d9b5197ef7107c77390e46fd82b9f830132c8d48ee34764b3b2cd95b52e24eb4b26c26cd454b6daa4de3e7b0
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Executes dropped EXE
-
Modifies Installed Components in the registry
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-