General
-
Target
OQ_PO_4500148488_Rev1.zip
-
Size
164KB
-
Sample
210705-p13xb3nl1e
-
MD5
b93c4059cd673561428d1fafc604b44d
-
SHA1
4afb1264a6cb6deb4d01fb35670be31a6c52e923
-
SHA256
eb9cc50ca63d4dce9240a7b0addffe5949ece11aa8aafac07b2c7072243023e3
-
SHA512
c3b986649387c216c255f3774398db32bcb352663a6448c48c4135f9eceaaeb9458d4c0b46baf320bfe61255842822502ae471f278e82059582c23ba22587e0f
Static task
static1
Behavioral task
behavioral1
Sample
OQ_PO_4500148488_Rev1.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
OQ_PO_4500148488_Rev1.exe
Resource
win10v20210410
Malware Config
Extracted
warzonerat
blacice24.hopto.org:5032
Targets
-
-
Target
OQ_PO_4500148488_Rev1.exe
-
Size
259KB
-
MD5
5434606b4299d30ef9ba8d4ddafe3e77
-
SHA1
3bd6309a6ef81b54accdc5cc3de3d07b9d677ef3
-
SHA256
322f8919feb65490f33815c92b90a96ccffd0a050d0ae491c360c498f3d2612b
-
SHA512
aef8f2f571d5ca3759a402b7410abf6a33c62736db12261c73dd4ccb045ab22217688296663e37155eaafa876e60ec7ba7faf9dda91e77f25e1a19074b483c7e
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-