Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04-03-2021 18:20

General

  • Target

    32bd7813_extracted.exe

  • Size

    98KB

  • MD5

    edc76f55dd524dff091b416acd0f705d

  • SHA1

    a668f20f713726cb206a262e6aa4f8d92ea9538a

  • SHA256

    e8323188b09701fb4b00e3df10a2dc641cc02b37ddd66466fb69fe05e70550f0

  • SHA512

    a7891b60a92ca1ebe15e8fcc35da9524a3dae17eef89fdb781b9e91038b818d620fba65ca35ad9b1569c3149e981f393b8d9c175ffddd57242eb4246b9b8a75c

Malware Config

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

Processes

  • C:\Users\Admin\AppData\Local\Temp\32bd7813_extracted.exe
    "C:\Users\Admin\AppData\Local\Temp\32bd7813_extracted.exe"
    1⤵
      PID:4704

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads