General
-
Target
b9b687613e9611caa1fe4a0ad4005706467c691243c7e34fc2149e597ca5d714
-
Size
2.9MB
-
Sample
250106-g47wza1laq
-
MD5
9818c8e2ed3bfdd471008e14d6a4e169
-
SHA1
56db13538a458615ae030fbae3043a1f81a48478
-
SHA256
b9b687613e9611caa1fe4a0ad4005706467c691243c7e34fc2149e597ca5d714
-
SHA512
e0fa0570f2af8c6ff77f1d3bc904fb09dafcdb2d92dab14e1d5a8c18b80c9fe98e141b2145ea89265e3cc5036b6c495c02fd9dce0ac942265d50d3cd65f47940
-
SSDEEP
24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHN:ATU7AAmw4gxeOw46fUbNecCCFbNecK
Behavioral task
behavioral1
Sample
b9b687613e9611caa1fe4a0ad4005706467c691243c7e34fc2149e597ca5d714.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b9b687613e9611caa1fe4a0ad4005706467c691243c7e34fc2149e597ca5d714.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
b9b687613e9611caa1fe4a0ad4005706467c691243c7e34fc2149e597ca5d714
-
Size
2.9MB
-
MD5
9818c8e2ed3bfdd471008e14d6a4e169
-
SHA1
56db13538a458615ae030fbae3043a1f81a48478
-
SHA256
b9b687613e9611caa1fe4a0ad4005706467c691243c7e34fc2149e597ca5d714
-
SHA512
e0fa0570f2af8c6ff77f1d3bc904fb09dafcdb2d92dab14e1d5a8c18b80c9fe98e141b2145ea89265e3cc5036b6c495c02fd9dce0ac942265d50d3cd65f47940
-
SSDEEP
24576:ATU7AAmZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eHN:ATU7AAmw4gxeOw46fUbNecCCFbNecK
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
4