General
-
Target
DAU7WuTeQv0
-
Size
608KB
-
Sample
240915-k4wqgswckd
-
MD5
1acbfb6d275b47369ff413b74fdf8978
-
SHA1
e61f1d412838db72e4d175e3e1aa053d628f6dcf
-
SHA256
09ffc5eae2b9cce4ee691bfa07230ed2e68ce1f0479ba3cd5180de315dd80ca2
-
SHA512
41ac9918705ad4a43347fcadb08972ccdf33b478a50cf9ec8a84a44eae0c45906e75022d178f13e08afb84b60e5bb5ee8c4c8cc509f91dd82010e93bf572e83f
-
SSDEEP
6144:wgO8wh8wD8wY8w58wu8wO8wW8wd8wx8wAPnCtF:wH8m8q8x8K8X8D8N8q808ZPk
Static task
static1
Behavioral task
behavioral1
Sample
DAU7WuTeQv0.html
Resource
win11-20240802-en
Malware Config
Extracted
warzonerat
168.61.222.215:5400
Targets
-
-
Target
DAU7WuTeQv0
-
Size
608KB
-
MD5
1acbfb6d275b47369ff413b74fdf8978
-
SHA1
e61f1d412838db72e4d175e3e1aa053d628f6dcf
-
SHA256
09ffc5eae2b9cce4ee691bfa07230ed2e68ce1f0479ba3cd5180de315dd80ca2
-
SHA512
41ac9918705ad4a43347fcadb08972ccdf33b478a50cf9ec8a84a44eae0c45906e75022d178f13e08afb84b60e5bb5ee8c4c8cc509f91dd82010e93bf572e83f
-
SSDEEP
6144:wgO8wh8wD8wY8w58wu8wO8wW8wd8wx8wAPnCtF:wH8m8q8x8K8X8D8N8q808ZPk
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Blocklisted process makes network request
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Subvert Trust Controls
1SIP and Trust Provider Hijacking
1