General
-
Target
023963ba_by_Libranalysis
-
Size
20KB
-
Sample
210520-jwyrfxlsxn
-
MD5
023963bab1004036861c41fd4c26bae8
-
SHA1
653718ee5b55fcab4f5b839405c5e31f8ab3e974
-
SHA256
54d1e98bd018d14be58e6a9a9bb8cb07a1be2cd5df3a528dfbe7b980b70c22d4
-
SHA512
186c6fe987769e211524343eb6b3b405d088ebe44b31e9f2c5282faabb7b1bb549bc7a0219c313ec05a6ee118e323ddab574bc73528929c97c4d20dc829269f8
Static task
static1
Behavioral task
behavioral1
Sample
44ce9bbea2b67d562f6b2b7941dc55df7049621fe8ffde240686fb8b7bfd4354.doc
Resource
win7v20210408
Behavioral task
behavioral2
Sample
44ce9bbea2b67d562f6b2b7941dc55df7049621fe8ffde240686fb8b7bfd4354.doc
Resource
win10v20210410
Malware Config
Extracted
warzonerat
37.120.210.211:22612
Targets
-
-
Target
44ce9bbea2b67d562f6b2b7941dc55df7049621fe8ffde240686fb8b7bfd4354
-
Size
23KB
-
MD5
e7a25f77d121b2a3821c3d8b0c47060c
-
SHA1
d4e3bc63059fca99a3f945195488569cfdb6d816
-
SHA256
44ce9bbea2b67d562f6b2b7941dc55df7049621fe8ffde240686fb8b7bfd4354
-
SHA512
04e567a102106494abb21ba60b65dae52d65c1b13776aa0f1517b9337591a14895a72a8d924d229c3bff76a57f7a34e883d7f7ce42bab431ba4ba1245eb6dbc1
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
AgentTesla Payload
-
Looks for VirtualBox Guest Additions in registry
-
Warzone RAT Payload
-
Downloads MZ/PE file
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-