General
-
Target
DHL_June 2021 at 11M_9BZ7290_PDF.exe
-
Size
231KB
-
Sample
210614-km86f4cw9s
-
MD5
dc41b3c367c1d2d128ab5a1bdbd62abc
-
SHA1
297d9d6131dd7b147ec56150fa43b265a4cd1f45
-
SHA256
b77ca2c247c1a659063b98829a0a6211e9c708f9ba40a691e02a4e8ab3cfb45b
-
SHA512
7644aca08296a1b026409651dd7d841cac8fd51018af900a65e400a0cfc50281da523dfde478b581cc4f7f2b98c416c924cee1c2fe04faf076b39ac35224a87c
Static task
static1
Behavioral task
behavioral1
Sample
DHL_June 2021 at 11M_9BZ7290_PDF.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
DHL_June 2021 at 11M_9BZ7290_PDF.exe
Resource
win10v20210410
Malware Config
Extracted
warzonerat
103.133.109.176:7600
Targets
-
-
Target
DHL_June 2021 at 11M_9BZ7290_PDF.exe
-
Size
231KB
-
MD5
dc41b3c367c1d2d128ab5a1bdbd62abc
-
SHA1
297d9d6131dd7b147ec56150fa43b265a4cd1f45
-
SHA256
b77ca2c247c1a659063b98829a0a6211e9c708f9ba40a691e02a4e8ab3cfb45b
-
SHA512
7644aca08296a1b026409651dd7d841cac8fd51018af900a65e400a0cfc50281da523dfde478b581cc4f7f2b98c416c924cee1c2fe04faf076b39ac35224a87c
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-