General
-
Target
PO List 030621.pdf.hta
-
Size
1KB
-
Sample
210607-a9dwr2h9tj
-
MD5
c69d7a4fcee29976c69a25ad6a25f627
-
SHA1
a44c31bce10346f44a6907b3a3092de8bc2b7c24
-
SHA256
2be3fbee47d3308141e55e0c06bf9e3ae7999ec67572c6038dea38ecd25ca876
-
SHA512
a4a3c86f43e8f8effe4fa333ec542e919f62b8da1dee21f542b4b857990c112e6296f58e9051fed1d251ffb6852eac45e424481304bb42d6cac46e46b6a29f16
Static task
static1
Behavioral task
behavioral1
Sample
PO List 030621.pdf.hta
Resource
win7v20210410
Behavioral task
behavioral2
Sample
PO List 030621.pdf.hta
Resource
win10v20210410
Malware Config
Extracted
https://ia601500.us.archive.org/3/items/all-2_202106/ALL2.TXT
Extracted
warzonerat
5.206.224.194:3080
Extracted
asyncrat
0.5.7B
14.191.50.101:8080
AsyncMutex_6SI8OkPnk
-
aes_key
qyv1ismvAgNTQ98WMOnwHYsv8UB8SL5j
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
Default
-
host
14.191.50.101
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
8080
-
version
0.5.7B
Targets
-
-
Target
PO List 030621.pdf.hta
-
Size
1KB
-
MD5
c69d7a4fcee29976c69a25ad6a25f627
-
SHA1
a44c31bce10346f44a6907b3a3092de8bc2b7c24
-
SHA256
2be3fbee47d3308141e55e0c06bf9e3ae7999ec67572c6038dea38ecd25ca876
-
SHA512
a4a3c86f43e8f8effe4fa333ec542e919f62b8da1dee21f542b4b857990c112e6296f58e9051fed1d251ffb6852eac45e424481304bb42d6cac46e46b6a29f16
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Async RAT payload
-
Warzone RAT Payload
-
Blocklisted process makes network request
-
Suspicious use of SetThreadContext
-