General
-
Target
Bank Slip_SC -038-20210303-B.scr
-
Size
1.1MB
-
Sample
210701-1j9ba3dmkx
-
MD5
0de04896312059da5e706416636ce15d
-
SHA1
d4b032118b54ef9772898e3db50c7524fbab9714
-
SHA256
abf24499470a3d16f45c1b747820a07784a1f98a5e29b2eb8414adcefe83012b
-
SHA512
5334242bc77d921b5ffb0b2883ece61abd47b90eb3c038e922b4b89542a4d8dba147273c173281a80b9b4476e1c5e84cd942b0dc618d911e33badeb962358823
Static task
static1
Behavioral task
behavioral1
Sample
Bank Slip_SC -038-20210303-B.scr
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Bank Slip_SC -038-20210303-B.scr
Resource
win10v20210410
Malware Config
Extracted
warzonerat
79.134.225.119:9584
Targets
-
-
Target
Bank Slip_SC -038-20210303-B.scr
-
Size
1.1MB
-
MD5
0de04896312059da5e706416636ce15d
-
SHA1
d4b032118b54ef9772898e3db50c7524fbab9714
-
SHA256
abf24499470a3d16f45c1b747820a07784a1f98a5e29b2eb8414adcefe83012b
-
SHA512
5334242bc77d921b5ffb0b2883ece61abd47b90eb3c038e922b4b89542a4d8dba147273c173281a80b9b4476e1c5e84cd942b0dc618d911e33badeb962358823
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-