General
-
Target
89c73a4b0e1ec4b864c3dffd8f314ad85ce52c79e07c6a71e4612086fb0488b0N
-
Size
1.2MB
-
Sample
241005-d18gjssgnn
-
MD5
ab66af48621552d289c68b3f197fbef0
-
SHA1
07259f3720f62eac6c1230c8eee49678de44c530
-
SHA256
89c73a4b0e1ec4b864c3dffd8f314ad85ce52c79e07c6a71e4612086fb0488b0
-
SHA512
e27d5e7edc70cb5adb0beee8c917f8cc474d82003afd34f55225565ff50dbfb31e09a3e2ae2c674483aa3ff319fbd40291416a300fc9c9517a0d826c079c250e
-
SSDEEP
12288:OIbsBDU0I6+Tu0TJ0N1oYgNOFDA7W2FeDSIGVH/KIDgDgUeHbY11kj:OIbGD2JTu0GoZQDbGV6eH81kj
Behavioral task
behavioral1
Sample
89c73a4b0e1ec4b864c3dffd8f314ad85ce52c79e07c6a71e4612086fb0488b0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
89c73a4b0e1ec4b864c3dffd8f314ad85ce52c79e07c6a71e4612086fb0488b0N.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
89c73a4b0e1ec4b864c3dffd8f314ad85ce52c79e07c6a71e4612086fb0488b0N
-
Size
1.2MB
-
MD5
ab66af48621552d289c68b3f197fbef0
-
SHA1
07259f3720f62eac6c1230c8eee49678de44c530
-
SHA256
89c73a4b0e1ec4b864c3dffd8f314ad85ce52c79e07c6a71e4612086fb0488b0
-
SHA512
e27d5e7edc70cb5adb0beee8c917f8cc474d82003afd34f55225565ff50dbfb31e09a3e2ae2c674483aa3ff319fbd40291416a300fc9c9517a0d826c079c250e
-
SSDEEP
12288:OIbsBDU0I6+Tu0TJ0N1oYgNOFDA7W2FeDSIGVH/KIDgDgUeHbY11kj:OIbGD2JTu0GoZQDbGV6eH81kj
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4