General
-
Target
be38a69081db308b628205a8d3bf1053120da733b05f38ac497a295723d2b29f (2).zip
-
Size
519KB
-
Sample
210704-qffk2pmfca
-
MD5
5d8a7c0f5037b80a077f735e88d4b045
-
SHA1
8605ff55a20a6eeefee69b1a8b4eddb1a143220c
-
SHA256
e39e81961661f0e514b2bea8f22075ab57cf4fdc12653ecc31fdf8603089c160
-
SHA512
7f16a5a98c3e46fe774d6b887263daa2d78bc636ae4e014471ff55de5cda578263dd81fc485f858b1d01ef0c6637cbcff68c5a30dc534f9de177fe6e592a34ae
Static task
static1
Behavioral task
behavioral1
Sample
be38a69081db308b628205a8d3bf1053120da733b05f38ac497a295723d2b29f.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
be38a69081db308b628205a8d3bf1053120da733b05f38ac497a295723d2b29f.exe
Resource
win10v20210408
Malware Config
Extracted
warzonerat
185.157.160.215:2211
Targets
-
-
Target
be38a69081db308b628205a8d3bf1053120da733b05f38ac497a295723d2b29f.exe
-
Size
807KB
-
MD5
1032e6ffdbb406b3ee80d7c50989e2b5
-
SHA1
fb63c770ba76d25f181be481acef62aa2cf5f82c
-
SHA256
be38a69081db308b628205a8d3bf1053120da733b05f38ac497a295723d2b29f
-
SHA512
bd5203164dd2a966c1db164f6d472615932a673d7be6105c5c36a130e1bb7582e4a9a479833ecbc102c36a5786ef1e459b8eec944beb8cdf51c763078a2923f3
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-