General
-
Target
e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN
-
Size
6.1MB
-
Sample
240923-c7lqpavakn
-
MD5
8366095353711474f30ebee85c51a090
-
SHA1
e8a0aea3dd081528cb9edd6fb454b6ac47177e1c
-
SHA256
e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baa
-
SHA512
50ebb10387b8c0ed3a64142c98cc6868320e3388bc4d6ba47addb9baf17203a6c5264053787749c53aaddb7a5ec6948d954555be7197b8f30c06d15a09091ad1
-
SSDEEP
49152:ATU7AAmw4gxeOw46fUbNecCCFbNecjTU7AAmw4gxeOw46fUbNecCCFbNecq:ATU7d9xZw46G8q8yTU7d9xZw46G8q8t
Behavioral task
behavioral1
Sample
e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baaN
-
Size
6.1MB
-
MD5
8366095353711474f30ebee85c51a090
-
SHA1
e8a0aea3dd081528cb9edd6fb454b6ac47177e1c
-
SHA256
e83a4d9dc17c3b84f8c0b811eb314d055a8f98b5276d120cd3c8190736526baa
-
SHA512
50ebb10387b8c0ed3a64142c98cc6868320e3388bc4d6ba47addb9baf17203a6c5264053787749c53aaddb7a5ec6948d954555be7197b8f30c06d15a09091ad1
-
SSDEEP
49152:ATU7AAmw4gxeOw46fUbNecCCFbNecjTU7AAmw4gxeOw46fUbNecCCFbNecq:ATU7d9xZw46G8q8yTU7d9xZw46G8q8t
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4