General
-
Target
RFQ-8372929.IMG
-
Size
1.2MB
-
Sample
210707-r85a5tzqze
-
MD5
a39409e3ecb4aec40f1e4fe18fbf09f2
-
SHA1
b6f3345891be51832a51347d9c290471ee2571df
-
SHA256
cb580eb33d7e00603fd65b594847041850369a88e6a6982e4dba9a514e8d3662
-
SHA512
1291eb1bcf9f35632c274a252a111740295db1b3cc330b81856804ee82069ef2df6707038b756b7d80487d08c8d51d5641353833722d16e4b88969cc0b791fc1
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_8372.EXE
Resource
win7v20210410
Behavioral task
behavioral2
Sample
RFQ_8372.EXE
Resource
win10v20210410
Malware Config
Extracted
warzonerat
blacice24.hopto.org:5032
Targets
-
-
Target
RFQ_8372.EXE
-
Size
268KB
-
MD5
a90ed1f4f7f3f78305e7de97d695558b
-
SHA1
c86ba7ddfbe6807d67a013f6a3ac9d5e794aff6b
-
SHA256
b3f62f715739b275634201649f33800caca201a2c6c32b1f424f2e312006ead0
-
SHA512
7eeedc19ee89791f17adc24390edbc79635a0145240d6b5e076493760886e3622929604b73db992b1093da00b4d39e252df149fd01cb6a0ef0a81dc9e863156f
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-