General
-
Target
Untitled.png
-
Size
50KB
-
Sample
241107-fa9yssxrhj
-
MD5
8e9c71ce941f1912f41cfaede1db1e24
-
SHA1
db19ac45731476b950be59a11987a213b768ba50
-
SHA256
e802fd8a9566b25ff2063176d894efe655e47cb1c746417691083ba3d6e7d8ec
-
SHA512
07e558d3718ec969ed06ecd499f6ee70871493d5d747b7762c7ef9302ca5faea0bcf89c465b37da88b569369600c918c1ccc4984a82f2b178bbd8b7d88cb09c6
-
SSDEEP
1536:fTub1Va7luiGYNZ+Q3zTXMscxEI9StVzyZLRT6:r8LaJj2gzL7IMEY
Static task
static1
Behavioral task
behavioral1
Sample
Untitled.png
Resource
win10v2004-20241007-en
Malware Config
Extracted
warzonerat
168.61.222.215:5400
Extracted
revengerat
Guest
0.tcp.ngrok.io:19521
RV_MUTEX
Targets
-
-
Target
Untitled.png
-
Size
50KB
-
MD5
8e9c71ce941f1912f41cfaede1db1e24
-
SHA1
db19ac45731476b950be59a11987a213b768ba50
-
SHA256
e802fd8a9566b25ff2063176d894efe655e47cb1c746417691083ba3d6e7d8ec
-
SHA512
07e558d3718ec969ed06ecd499f6ee70871493d5d747b7762c7ef9302ca5faea0bcf89c465b37da88b569369600c918c1ccc4984a82f2b178bbd8b7d88cb09c6
-
SSDEEP
1536:fTub1Va7luiGYNZ+Q3zTXMscxEI9StVzyZLRT6:r8LaJj2gzL7IMEY
-
Revengerat family
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
RevengeRat Executable
-
Warzone RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1