General
-
Target
2024-08-13_3912075c2bbaf4bdfafd60bc64b81cda_avoslocker_hijackloader
-
Size
5.2MB
-
Sample
240813-xeag6szfrh
-
MD5
3912075c2bbaf4bdfafd60bc64b81cda
-
SHA1
91c9fa5d7401ad2e9dc8c91fe9534d421311af51
-
SHA256
318fdeed253a880cb709ff8271eef56322e07745cc8266a8395868d8e5abd400
-
SHA512
c9b938de71361ccef0d0d66c4f4ba5e44f7b0cc04d8d63d938d817f765b98b741c7af3105279a5ad4850a8fe69c2eeebc078a70abc6c52cf421cf152b9f1bbcb
-
SSDEEP
98304:HYBKqmTVA7id7RyFZ+bhz4NjufxOU/jIEeQfoR/IuOFVjUu5:wiTyybOSxFIF0wu
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-13_3912075c2bbaf4bdfafd60bc64b81cda_avoslocker_hijackloader.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-08-13_3912075c2bbaf4bdfafd60bc64b81cda_avoslocker_hijackloader.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
warzonerat
victorybelng.ddns.net:13900
Targets
-
-
Target
2024-08-13_3912075c2bbaf4bdfafd60bc64b81cda_avoslocker_hijackloader
-
Size
5.2MB
-
MD5
3912075c2bbaf4bdfafd60bc64b81cda
-
SHA1
91c9fa5d7401ad2e9dc8c91fe9534d421311af51
-
SHA256
318fdeed253a880cb709ff8271eef56322e07745cc8266a8395868d8e5abd400
-
SHA512
c9b938de71361ccef0d0d66c4f4ba5e44f7b0cc04d8d63d938d817f765b98b741c7af3105279a5ad4850a8fe69c2eeebc078a70abc6c52cf421cf152b9f1bbcb
-
SSDEEP
98304:HYBKqmTVA7id7RyFZ+bhz4NjufxOU/jIEeQfoR/IuOFVjUu5:wiTyybOSxFIF0wu
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Warzone RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1