General
-
Target
17f72cef60c40492ad8f86a4f4aedb05a8f7384a6364bdb20bba6f9c124dae07N.exe
-
Size
2.9MB
-
Sample
250104-hml4lsxqbx
-
MD5
250a4ca15e86eec73c2960c718b395a0
-
SHA1
455df2cf1a7bee9077773f15ae0f6729db09f8bc
-
SHA256
17f72cef60c40492ad8f86a4f4aedb05a8f7384a6364bdb20bba6f9c124dae07
-
SHA512
572de7269df775ff665baad03477d6d6c71de2e00c7640c38d5309558f4147a19a3e3d96361cbc1a263918ac20a15097f78fb8bcf20d2ee6ae050f892612a852
-
SSDEEP
24576:eTy7ASmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHR:eTy7ASmw4gxeOw46fUbNecCCFbNecy
Behavioral task
behavioral1
Sample
17f72cef60c40492ad8f86a4f4aedb05a8f7384a6364bdb20bba6f9c124dae07N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
17f72cef60c40492ad8f86a4f4aedb05a8f7384a6364bdb20bba6f9c124dae07N.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
17f72cef60c40492ad8f86a4f4aedb05a8f7384a6364bdb20bba6f9c124dae07N.exe
-
Size
2.9MB
-
MD5
250a4ca15e86eec73c2960c718b395a0
-
SHA1
455df2cf1a7bee9077773f15ae0f6729db09f8bc
-
SHA256
17f72cef60c40492ad8f86a4f4aedb05a8f7384a6364bdb20bba6f9c124dae07
-
SHA512
572de7269df775ff665baad03477d6d6c71de2e00c7640c38d5309558f4147a19a3e3d96361cbc1a263918ac20a15097f78fb8bcf20d2ee6ae050f892612a852
-
SSDEEP
24576:eTy7ASmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHR:eTy7ASmw4gxeOw46fUbNecCCFbNecy
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4