General
-
Target
file.exe
-
Size
141KB
-
Sample
210630-yx1rg9at3s
-
MD5
74708b96618bd93dfadf391c9a2cf610
-
SHA1
04c0161058cbd959037d513b4b4165228c8a9f3a
-
SHA256
7104a4df53b683b1a99c9767c743a53d3ffe200f31279ee3d31f1514fb5fa95e
-
SHA512
7ab7db9e203a04256833fbabce10df706fb3c7e80f8b4b6b0b120b23c2deb8fa81b409b111786bcc262219d82e0fd78a2860bbd890fb9d3137bcc74484edd25c
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v20210408
Malware Config
Extracted
warzonerat
185.157.160.215:2211
Targets
-
-
Target
file.exe
-
Size
141KB
-
MD5
74708b96618bd93dfadf391c9a2cf610
-
SHA1
04c0161058cbd959037d513b4b4165228c8a9f3a
-
SHA256
7104a4df53b683b1a99c9767c743a53d3ffe200f31279ee3d31f1514fb5fa95e
-
SHA512
7ab7db9e203a04256833fbabce10df706fb3c7e80f8b4b6b0b120b23c2deb8fa81b409b111786bcc262219d82e0fd78a2860bbd890fb9d3137bcc74484edd25c
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-