General
-
Target
RFQ ARN-PO-2021-13-00072.IMG
-
Size
1.2MB
-
Sample
210629-pbba37akge
-
MD5
cc38f8e7232a99b6944fc27b1646cc02
-
SHA1
d52113b61eced7c3cea5d8fa1c1a64986dfac3b0
-
SHA256
0bc92d971961771b8978c8ab8d0ba39580a508b5187ea1ee2be32025fcd8c736
-
SHA512
de3229135f90a0dcee8b10fd5531736db4139203cc185582a140a3abc10c42cedb91d22494fc2ff0dda731dffbdc9b23ce371ba821a32a4b917d8131ed813ae2
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_ARN_.EXE
Resource
win7v20210410
Behavioral task
behavioral2
Sample
RFQ_ARN_.EXE
Resource
win10v20210408
Malware Config
Targets
-
-
Target
RFQ_ARN_.EXE
-
Size
484KB
-
MD5
67e02a46351f8e0bfa3d4ee467719f33
-
SHA1
87b4d8c11bf8cd310ba57cf58a6081bcbdf15a2e
-
SHA256
ecaaf9df12406f873f3f27894dcd77624fc37dc323b57730d483c6b84c4b685f
-
SHA512
2545fc7776dc03c8a9555bdeb2b2fac2117863c0b594489695280246e89e6f36e3ed32741d4e1d6d4ae103518c60b072e6944558cefdf198aa5c5e4a0db1ce89
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-