General
-
Target
Microsoft.ps1
-
Size
779KB
-
Sample
210607-f8b478zhpx
-
MD5
202491949283ca454f7a5ad9467d2c35
-
SHA1
ab57577bf573f33d61f279dcddbff424a2c4ba29
-
SHA256
070f3d73cf4c3b2c0cfbf7f1e3e8f7f659a61fafed1dcf75691b402e34f539e1
-
SHA512
9aac65a71ccc895b86ba115c3c899dbc7f88d153b925f03da72af10bb2dda3d014c15c9f5f333a6f18a13e5cf5f1334e95033b856c83aa19024ca5c4028cb4cc
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft.ps1
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Microsoft.ps1
Resource
win10v20210408
Malware Config
Extracted
warzonerat
5.206.224.194:3080
Extracted
asyncrat
0.5.7B
14.191.50.101:8080
AsyncMutex_6SI8OkPnk
-
aes_key
qyv1ismvAgNTQ98WMOnwHYsv8UB8SL5j
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
Default
-
host
14.191.50.101
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
8080
-
version
0.5.7B
Targets
-
-
Target
Microsoft.ps1
-
Size
779KB
-
MD5
202491949283ca454f7a5ad9467d2c35
-
SHA1
ab57577bf573f33d61f279dcddbff424a2c4ba29
-
SHA256
070f3d73cf4c3b2c0cfbf7f1e3e8f7f659a61fafed1dcf75691b402e34f539e1
-
SHA512
9aac65a71ccc895b86ba115c3c899dbc7f88d153b925f03da72af10bb2dda3d014c15c9f5f333a6f18a13e5cf5f1334e95033b856c83aa19024ca5c4028cb4cc
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Async RAT payload
-
Warzone RAT Payload
-
Suspicious use of SetThreadContext
-