General
-
Target
RFQ ARN-PO-2021-13-00074.IMG
-
Size
1.2MB
-
Sample
210629-kln8dz57ha
-
MD5
bf86fbf3df977e6f74040dff8a04dc63
-
SHA1
ff2d8c0cef7fa44585cde78871b01b97a87d338f
-
SHA256
cb20a342cc885e75e8185f86311406092c7d5e9d4129ae96448b73304b8ea195
-
SHA512
16ded7e4aac0b5a685db1d8b23ac3f956693701879f9147012ae8a92c83f8caa289811c1693c30650b73d8ecc9181ebc9b1f36b3d23dffbf1feb10dc58938b84
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_ARN_.EXE
Resource
win7v20210410
Behavioral task
behavioral2
Sample
RFQ_ARN_.EXE
Resource
win10v20210410
Malware Config
Targets
-
-
Target
RFQ_ARN_.EXE
-
Size
484KB
-
MD5
67e02a46351f8e0bfa3d4ee467719f33
-
SHA1
87b4d8c11bf8cd310ba57cf58a6081bcbdf15a2e
-
SHA256
ecaaf9df12406f873f3f27894dcd77624fc37dc323b57730d483c6b84c4b685f
-
SHA512
2545fc7776dc03c8a9555bdeb2b2fac2117863c0b594489695280246e89e6f36e3ed32741d4e1d6d4ae103518c60b072e6944558cefdf198aa5c5e4a0db1ce89
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-