General
-
Target
02bc58763532335e0725da331b133c9d
-
Size
4.5MB
-
Sample
240914-ccfwys1cmm
-
MD5
02bc58763532335e0725da331b133c9d
-
SHA1
7f835610fc389225449f43c9a0343d2873adf8cd
-
SHA256
a28a2d51706c721688a64dcb95d08c10f62764afee573cc550e6166a285f8ad8
-
SHA512
b8e6cf3dbab03dba4bf80a581de712e4c4131e7fa226825902e11a79ab72397eb7a02033d9fbb6fce27b8df83681bf16d41ec3c4a8b3fdce8ade13fe30d92b6e
-
SSDEEP
24576:K1gg4CppEI6GGfWDkOQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0t:K1XP6rPbNechC0bNechC0bNec/
Behavioral task
behavioral1
Sample
02bc58763532335e0725da331b133c9d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
02bc58763532335e0725da331b133c9d.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
02bc58763532335e0725da331b133c9d
-
Size
4.5MB
-
MD5
02bc58763532335e0725da331b133c9d
-
SHA1
7f835610fc389225449f43c9a0343d2873adf8cd
-
SHA256
a28a2d51706c721688a64dcb95d08c10f62764afee573cc550e6166a285f8ad8
-
SHA512
b8e6cf3dbab03dba4bf80a581de712e4c4131e7fa226825902e11a79ab72397eb7a02033d9fbb6fce27b8df83681bf16d41ec3c4a8b3fdce8ade13fe30d92b6e
-
SSDEEP
24576:K1gg4CppEI6GGfWDkOQDbGV6eH8tkxIbGD2JTu0GoWQDbGV6eH8tkxIbGD2JTu0t:K1XP6rPbNechC0bNechC0bNec/
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4