General
-
Target
3862972f557cdda70fcc672a92efd171f1de7324481fb3367e46afe94e79ac2d
-
Size
6.1MB
-
Sample
240828-zs65eawbpc
-
MD5
10ccfb48b3fdac746af0a198cd947288
-
SHA1
71200c1c2a052da712f1b086578f68cf5a4388af
-
SHA256
3862972f557cdda70fcc672a92efd171f1de7324481fb3367e46afe94e79ac2d
-
SHA512
e6b8830e70c8c11d69a33277a96cb8a0bf4bf485641440ffd754ff176b07eb112905d39b564a0438adb7b3c45eb04b8a1b9275a7549c97f33f351ab95d65fead
-
SSDEEP
49152:ATU7AAmw4gxeOw46fUbNecCCFbNecjTU7AAmw4gxeOw46fUbNecCCFbNecu:ATU7d9xZw46G8q8yTU7d9xZw46G8q8N
Behavioral task
behavioral1
Sample
3862972f557cdda70fcc672a92efd171f1de7324481fb3367e46afe94e79ac2d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3862972f557cdda70fcc672a92efd171f1de7324481fb3367e46afe94e79ac2d.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
3862972f557cdda70fcc672a92efd171f1de7324481fb3367e46afe94e79ac2d
-
Size
6.1MB
-
MD5
10ccfb48b3fdac746af0a198cd947288
-
SHA1
71200c1c2a052da712f1b086578f68cf5a4388af
-
SHA256
3862972f557cdda70fcc672a92efd171f1de7324481fb3367e46afe94e79ac2d
-
SHA512
e6b8830e70c8c11d69a33277a96cb8a0bf4bf485641440ffd754ff176b07eb112905d39b564a0438adb7b3c45eb04b8a1b9275a7549c97f33f351ab95d65fead
-
SSDEEP
49152:ATU7AAmw4gxeOw46fUbNecCCFbNecjTU7AAmw4gxeOw46fUbNecCCFbNecu:ATU7d9xZw46G8q8yTU7d9xZw46G8q8N
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4