Description
[WarzoneRAT](https://attack.mitre.org/software/S0670) is a malware-as-a-service remote access tool (RAT) written in C++ that has been publicly available for purchase since at least late 2018.(Citation: Check Point Warzone Feb 2020)(Citation: Uptycs Warzone UAC Bypass November 2020)
External References
Techniques Used by This Malware
- T1005 — Data from Local System
- T1014 — Rootkit
- T1021.001 — Remote Desktop Protocol
- T1021.005 — VNC
- T1041 — Exfiltration Over C2 Channel
- T1055 — Process Injection
- T1056.001 — Keylogging
- T1057 — Process Discovery
- T1059.001 — PowerShell
- T1059.003 — Windows Command Shell
- T1082 — System Information Discovery
- T1083 — File and Directory Discovery
- T1090 — Proxy
- T1095 — Non-Application Layer Protocol
- T1105 — Ingress Tool Transfer
- T1106 — Native API
- T1112 — Modify Registry
- T1125 — Video Capture
- T1140 — Deobfuscate/Decode Files or Information
- T1204.002 — Malicious File
- T1221 — Template Injection
- T1546.015 — Component Object Model Hijacking
- T1547.001 — Registry Run Keys / Startup Folder
- T1548.002 — Bypass User Account Control
- T1555.003 — Credentials from Web Browsers
- T1562.001 — Disable or Modify Tools
- T1564 — Hide Artifacts
- T1564.003 — Hidden Window
- T1566.001 — Spearphishing Attachment
- T1573.001 — Symmetric Cryptography