General
-
Target
rbxfpsunlocker-x64 (3).zip
-
Size
250KB
-
Sample
240804-lk68jsscpk
-
MD5
994c2bc7d966516aab11896b8a4cbc8e
-
SHA1
350502479588c281ea67747288f9f2469e6c34f1
-
SHA256
92b2d2a44e57ae9d47806eba7e62ef0d0e3b152e822803845e9bfe74adb6efc3
-
SHA512
12b8bb979bc8d8f7def35cc8e727c715b442d30a9b5bf2568931d3fbe43963e540bdaf44aba88b3db37df876476b3c940dbd454ba53ef5ab9c70c8b68d58abaf
-
SSDEEP
6144:9ObRmprIxqYPUynYaYGiCB2YWrfb1Vd/X254xix6LU:I9mprAqYXnYaYFCUYSbc5cLU
Static task
static1
Behavioral task
behavioral1
Sample
rbxfpsunlocker.exe
Resource
win11-20240802-en
Malware Config
Extracted
revengerat
Guest
0.tcp.ngrok.io:19521
RV_MUTEX
Extracted
warzonerat
168.61.222.215:5400
Targets
-
-
Target
rbxfpsunlocker.exe
-
Size
605KB
-
MD5
09d083f0e2c1e8a3561209902333ad8f
-
SHA1
d9692d3aba34a39aeb9e53cb3d25562b94e2e597
-
SHA256
83dfcb08ea4aa1b857d952a8a177db775d1a7e9cfc30b528848a4a29c8dbf0b9
-
SHA512
c71371263cacc4872a4bf621614940f08c9436062683be5de921ae6e509079e25ea380623e8945d40858819a664bd76590defb2a89949e8e5666190f1024ca6b
-
SSDEEP
12288:IKOjJsDc2+WC+D+4H/xeGofENaTSuGCC709:IKyacgDD+4fwG1NaTSw
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
RevengeRat Executable
-
Warzone RAT payload
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Scripting
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1