General
-
Target
Proof_Of_Payment.exe
-
Size
942KB
-
Sample
210612-c16jdav4ha
-
MD5
81ea748120efdf6f2b9ca5399d679127
-
SHA1
278feed07c294c6c9588020ff7c4cdbcfa8f4732
-
SHA256
2428a665140dcba43e5dbcffc5cebf65807ab30e3a0b4083c0f9b44b8a830714
-
SHA512
50b41c47b14d10283126e2712c84e0186bfb3c9e9a4ac48a99fd36d78e5258a0ef3f98707a43d56cea344d85dd91178413eae3ababe4d737fa6dd85daa3f17a3
Static task
static1
Behavioral task
behavioral1
Sample
Proof_Of_Payment.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Proof_Of_Payment.exe
Resource
win10v20210410
Malware Config
Extracted
warzonerat
emaildayo24.duckdns.org:5207
Targets
-
-
Target
Proof_Of_Payment.exe
-
Size
942KB
-
MD5
81ea748120efdf6f2b9ca5399d679127
-
SHA1
278feed07c294c6c9588020ff7c4cdbcfa8f4732
-
SHA256
2428a665140dcba43e5dbcffc5cebf65807ab30e3a0b4083c0f9b44b8a830714
-
SHA512
50b41c47b14d10283126e2712c84e0186bfb3c9e9a4ac48a99fd36d78e5258a0ef3f98707a43d56cea344d85dd91178413eae3ababe4d737fa6dd85daa3f17a3
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-