General
-
Target
6848963c64d436902b411ffe50ac93f3b0e45c19e5828c05df7503c32c857916
-
Size
1.8MB
-
Sample
241217-3gx9xatner
-
MD5
4ca42547d30e4f790b04a3db5288cd16
-
SHA1
a07ab1d80757b44cb1a0c411be91510fc8731dbf
-
SHA256
6848963c64d436902b411ffe50ac93f3b0e45c19e5828c05df7503c32c857916
-
SHA512
f3e2b80d1996f065c26b1e1e3e9e6c19b47b081d87b2f550412a1b8915aa445185e41407477ea724b85ba5bf4793d4c3f2e216e71a4b795c9eb201824cf52c71
-
SSDEEP
12288:i254f/VAuj79umm3xR0lq+X6kOyeXiYxewRJBWW59qA7W2FeDSIGVH/KIDgDgUeG:x+D9uVMpjOyerrFQDbGV6eH81kS
Behavioral task
behavioral1
Sample
6848963c64d436902b411ffe50ac93f3b0e45c19e5828c05df7503c32c857916.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6848963c64d436902b411ffe50ac93f3b0e45c19e5828c05df7503c32c857916.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
6848963c64d436902b411ffe50ac93f3b0e45c19e5828c05df7503c32c857916
-
Size
1.8MB
-
MD5
4ca42547d30e4f790b04a3db5288cd16
-
SHA1
a07ab1d80757b44cb1a0c411be91510fc8731dbf
-
SHA256
6848963c64d436902b411ffe50ac93f3b0e45c19e5828c05df7503c32c857916
-
SHA512
f3e2b80d1996f065c26b1e1e3e9e6c19b47b081d87b2f550412a1b8915aa445185e41407477ea724b85ba5bf4793d4c3f2e216e71a4b795c9eb201824cf52c71
-
SSDEEP
12288:i254f/VAuj79umm3xR0lq+X6kOyeXiYxewRJBWW59qA7W2FeDSIGVH/KIDgDgUeG:x+D9uVMpjOyerrFQDbGV6eH81kS
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4