General
-
Target
ef3c586c8e14ed856d7c14ba3848d0a7c5e08e6a4456239dda43178d29e5ef6bN
-
Size
2.9MB
-
Sample
240922-c9gjraycpd
-
MD5
291686885d1bedf3b54ef2c7b68eb450
-
SHA1
b7eb1ac2ec8f6e1cbd1ca3f1a784f7161a8593f5
-
SHA256
ef3c586c8e14ed856d7c14ba3848d0a7c5e08e6a4456239dda43178d29e5ef6b
-
SHA512
38e1449d932659f09f60de8d2dc412da1bbae75cc9fb3f5ea418d055aca17d62ae9269f490270219af778466b4ed840ae520e0e3d17ea4615fdd49df85861abc
-
SSDEEP
24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHN:ATU7AAmw4gxeOw46fUbNecCCFbNecU
Behavioral task
behavioral1
Sample
ef3c586c8e14ed856d7c14ba3848d0a7c5e08e6a4456239dda43178d29e5ef6bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef3c586c8e14ed856d7c14ba3848d0a7c5e08e6a4456239dda43178d29e5ef6bN.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
ef3c586c8e14ed856d7c14ba3848d0a7c5e08e6a4456239dda43178d29e5ef6bN
-
Size
2.9MB
-
MD5
291686885d1bedf3b54ef2c7b68eb450
-
SHA1
b7eb1ac2ec8f6e1cbd1ca3f1a784f7161a8593f5
-
SHA256
ef3c586c8e14ed856d7c14ba3848d0a7c5e08e6a4456239dda43178d29e5ef6b
-
SHA512
38e1449d932659f09f60de8d2dc412da1bbae75cc9fb3f5ea418d055aca17d62ae9269f490270219af778466b4ed840ae520e0e3d17ea4615fdd49df85861abc
-
SSDEEP
24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHN:ATU7AAmw4gxeOw46fUbNecCCFbNecU
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4