General
-
Target
DHL_June 2021 at 15.M_9K790_PDF.exe
-
Size
216KB
-
Sample
210615-628d5jg3j2
-
MD5
899612504ac334861ae2822a48b6900e
-
SHA1
59aae8bc08ba6457fff7388ff8d39812cb177001
-
SHA256
f5b8a50215dcddbf419f5e1f81d423f414330d5690a6178c2e15a263d2570c5a
-
SHA512
e2f32d54223a8aef21090d414c9cff266dd7c29265b5f83512db03fc1d5085a713b6e6a8e654e98f04aaab1ef2eafced5eb58c2b0ce2f753f91293da8569fad8
Static task
static1
Behavioral task
behavioral1
Sample
DHL_June 2021 at 15.M_9K790_PDF.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
DHL_June 2021 at 15.M_9K790_PDF.exe
Resource
win10v20210408
Malware Config
Extracted
warzonerat
103.133.109.176:7600
Targets
-
-
Target
DHL_June 2021 at 15.M_9K790_PDF.exe
-
Size
216KB
-
MD5
899612504ac334861ae2822a48b6900e
-
SHA1
59aae8bc08ba6457fff7388ff8d39812cb177001
-
SHA256
f5b8a50215dcddbf419f5e1f81d423f414330d5690a6178c2e15a263d2570c5a
-
SHA512
e2f32d54223a8aef21090d414c9cff266dd7c29265b5f83512db03fc1d5085a713b6e6a8e654e98f04aaab1ef2eafced5eb58c2b0ce2f753f91293da8569fad8
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-