Skip to main content

WezRat

This is a defensive tool-intelligence page. It is intended for analyst navigation, source review, and hunt planning. It is not a malware-analysis report and does not contain sample code or binaries.

Summary

  • Associated actor(s): Cotton Sandstorm
  • Tool type(s): Modular infostealer / RAT
  • Confidence level(s): High
  • Source ID(s): SRC-CP-WEZRAT

Behavior

ActorBehavior Summary
Cotton SandstormCheck Point reports WezRat as a modular infostealer/RAT distributed through fake INCD-themed phishing; behavior includes modular collection, command execution, screenshot or data theft capabilities depending on module, and Israeli security-update lure abuse.

Hash And IOC Status

ActorStatusReference
Cotton SandstormHash not committed; use Check Point and government IOC references for current sample hashes, lure senders, domains, and C2 paths.SRC-CP-WEZRAT

Hashes and IOCs on this page are source pointers or representative public indicators. They SHOULD be refreshed from the linked source before operational use and MUST NOT be used alone for actor attribution.

Defensive Hunting Notes

ActorHunting Notes
Cotton SandstormHunt fake INCD/security-update lures, sender/domain impersonation, user-path execution after download, modular infostealer staging, and unusual outbound C2 after security-themed attachments.

Handling Notes

ActorHandling Notes
Cotton SandstormDo not store payloads; treat lure reuse and persona context through evidence and persona-claim workflow.

Mapped ATT&CK Techniques For Associated Actor(s)

ActorTechniqueTacticMapping QualitySource
Cotton SandstormT1585 Establish AccountsResource DevelopmentM1SRC-MS-IRAN-IO
Cotton SandstormT1204.002 User Execution: Malicious FileExecutionM3SRC-CP-WEZRAT
Cotton SandstormT1566 PhishingInitial AccessM3SRC-FBI-EMENNET-2024

These detections are mapped through the associated actor or scenario and are not automatically tool-specific. Promote a tool-specific detection only after the behavior is tied to telemetry and test evidence.

ActorDetectionRelease StatusDRLRule
Cotton SandstormDET-004 - Mail Click To Execution CorrelationHunt4detections/kql/mail-click-to-exec-correlation.kql

These hunts are mapped through the associated actor or scenario and may need narrowing before they are used for this specific tool.

ActorHuntHypothesisQuery
Cotton SandstormHUNT-004If VIP phishing is active then mail click events will correlate to risky sign-in or executiondetections/kql/mail-click-to-exec-correlation.kql

Source Review

SourcePublisherDateReliabilityTypeLast Reviewed
SRC-CP-WEZRATCheck Point Research2024-11-14AVendor CTI2026-05-14

If a source publishes a large or frequently changing IOC appendix, keep the current IOC list in the source system or TIP and store only the pointer here.