General
-
Target
Quotation-Request.zip
-
Size
169KB
-
Sample
210712-jk4cn3l6x2
-
MD5
672d097a62a05e02e3cc7aae6bdf7954
-
SHA1
53814d596056e4e276d0d5aa2fb3e88202d29e1e
-
SHA256
a6c0b5ffc572e8892a3a140b82a956374c5a7d0670244c0f63a7c201f050cce5
-
SHA512
c641cf3ace48c165091c57385194c59cc6d32b3cc5db720ee1cfa4abe9188148f255755f49f0f9d28a946f9d26544cd889e60e6e28f22299030feb950b305209
Static task
static1
Behavioral task
behavioral1
Sample
Quotation-Request.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Quotation-Request.exe
Resource
win10v20210410
Malware Config
Extracted
warzonerat
blacice24.hopto.org:5032
Targets
-
-
Target
Quotation-Request.exe
-
Size
282KB
-
MD5
4e3cfd2f0ab3148901ba7e33a1ba8ee3
-
SHA1
324c353ceb28f6134333e9b794cb0b8e03e9a1e6
-
SHA256
a3eb95be23a44e65540fda0d8b3114f98be79d63818cb42ef9472cafaa24e472
-
SHA512
6f40d01c1eb1276075baf4cafcb7234992a2a4d9fa7b0b7787d8676bcd5c93736b36c9c77a145c721886fd75ccd65e862f0c3d2eba00641e9837f134ca22cef8
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-