General
-
Target
ebb9c64a32a926993506ff5d4d81e8f6d0b6eb5e2dc14b30ab6055d243fb1d3a
-
Size
620KB
-
Sample
241212-j22chszpgq
-
MD5
ba6ae91584cad2f0530d0be90cdc6253
-
SHA1
fd892071274a167b3b95e72ba9dce3d93cffae14
-
SHA256
ebb9c64a32a926993506ff5d4d81e8f6d0b6eb5e2dc14b30ab6055d243fb1d3a
-
SHA512
257dfa62509fb865c1654203d4d242b83b886af6bef854574cea31881523715bdca675bc2b7477111c472a0b811b662891d29d504f19a36313f8ddc9db3b6626
-
SSDEEP
12288:EgoECYd/kTOHsPYMlMitV+53P5yj+R8EYkUVqjwgxnzye7hr2SV++v+:EgoECTOHsPYMlMo8F5NFP62wgJywq+v+
Static task
static1
Behavioral task
behavioral1
Sample
PP-200446-FDA.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PP-200446-FDA.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
warzonerat
45.154.98.140:9087
Targets
-
-
Target
PP-200446-FDA.exe
-
Size
839KB
-
MD5
59fbab4581eaeba4bf0463a1e10fd04d
-
SHA1
2c8752a3eff0c8baf7f73d3a31c473fc3d9b0647
-
SHA256
25c728d3e263928d1893e3b3979307f9959f4f1bcd2907a9e820649105e91cbb
-
SHA512
e6f3cf77c4b38ba2ce245fd6b3a4eda354ef6716a5424e425df22af60593f5d1a7834ace0412072cb3aac834c1341f9e7d9218af60b9f7d403a6e21a8d8a009a
-
SSDEEP
24576:UjlIhSPd+prp+l55U7J65FVACiJ6EXEr8:Ujl+SPspm6A58mI
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1