General
-
Target
SHIPPING DOCUMENT.exe
-
Size
894KB
-
Sample
210119-acqakxycrn
-
MD5
df83820db281080e66e57ca20f2b7f45
-
SHA1
eaf95598907bbcfc067ea97529661e849e369600
-
SHA256
1b239419c0f7b8b7fee565928beaaee9c32d0897a1f4948f72a7a5339fd60b31
-
SHA512
092c428ec3aea82ca1c278d334147aedd347713bca6fcfe3f5035a2890031a9159038df36c3ea9812d059530edc7b953326c6c601cd09e8bbf16fc763b10c2fc
Static task
static1
Behavioral task
behavioral1
Sample
SHIPPING DOCUMENT.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
SHIPPING DOCUMENT.exe
Resource
win10v20201028
Malware Config
Extracted
warzonerat
40.84.216.183:7600
Targets
-
-
Target
SHIPPING DOCUMENT.exe
-
Size
894KB
-
MD5
df83820db281080e66e57ca20f2b7f45
-
SHA1
eaf95598907bbcfc067ea97529661e849e369600
-
SHA256
1b239419c0f7b8b7fee565928beaaee9c32d0897a1f4948f72a7a5339fd60b31
-
SHA512
092c428ec3aea82ca1c278d334147aedd347713bca6fcfe3f5035a2890031a9159038df36c3ea9812d059530edc7b953326c6c601cd09e8bbf16fc763b10c2fc
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Suspicious use of SetThreadContext
-