General
-
Target
Order.exe
-
Size
315KB
-
Sample
210629-ac5s714fcx
-
MD5
78033d4e72e5dc0be2eedaec4e95627a
-
SHA1
87e25f605fc8c4c15bf6da42602cb69c4d9cd77e
-
SHA256
0823e54b076d1359145b0060fe0d0f80b73220ddec8cc23d4901bd1e448e6ad6
-
SHA512
b36096f52f5968fc0680f5bb3037c031751b30180b2d6aaa0f9ae5b9feeb9fb2b1e1940f1dc94482d2828d7d9105768d9235875944bc5aea2c687a05dee0e347
Static task
static1
Behavioral task
behavioral1
Sample
Order.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Order.exe
Resource
win10v20210408
Malware Config
Extracted
warzonerat
sungito.zklg.net:4020
Targets
-
-
Target
Order.exe
-
Size
315KB
-
MD5
78033d4e72e5dc0be2eedaec4e95627a
-
SHA1
87e25f605fc8c4c15bf6da42602cb69c4d9cd77e
-
SHA256
0823e54b076d1359145b0060fe0d0f80b73220ddec8cc23d4901bd1e448e6ad6
-
SHA512
b36096f52f5968fc0680f5bb3037c031751b30180b2d6aaa0f9ae5b9feeb9fb2b1e1940f1dc94482d2828d7d9105768d9235875944bc5aea2c687a05dee0e347
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-