General
-
Target
06a3fe74ff3dd352db742ac96c6fbd0da1a0d98164dda2a6637e809ec0f48b35.bin
-
Size
1.4MB
-
Sample
210709-abfq6g321a
-
MD5
4f7714d1358d9451b02c68a3511c182f
-
SHA1
b77289daf38b5bf421884f01b029e668bfc63b4c
-
SHA256
06a3fe74ff3dd352db742ac96c6fbd0da1a0d98164dda2a6637e809ec0f48b35
-
SHA512
35e1609f0488854aa0bd669a930dc6491447ee94d2ac0ea5432b1164982a6f320799f9570686a55601d1f3f6a8eb97483f41183e5a33f773cee4388e9470074a
Static task
static1
Behavioral task
behavioral1
Sample
SF40_DOC.EXE
Resource
win7v20210408
Behavioral task
behavioral2
Sample
SF40_DOC.EXE
Resource
win10v20210410
Malware Config
Extracted
warzonerat
165.22.5.66:6666
Targets
-
-
Target
SF40_DOC.EXE
-
Size
849KB
-
MD5
5fa6432e603ca1213d01f299bbca424e
-
SHA1
a19e5b5d4cef9deeab13cce791667b9f5d0197e8
-
SHA256
538dd70b0fda0df8180fb4ee04301a46b70fde291f20bffdd898d686a89915f1
-
SHA512
5aabcdc101b0cabf53181ddacd8decd06b795684b7358452afb198a638a1e6a474605eba8f8d9c9ae78a55d0df1544060608ff634ef35ebb587d1f21d41911fc
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Suspicious use of SetThreadContext
-