General
-
Target
EMTECH IPH GROUP.exe
-
Size
62KB
-
Sample
210720-rhhq97x1rj
-
MD5
4b3470167aed6f5cba3103b3abaaa7c4
-
SHA1
6282b6635b89c19086e7e77aa508aa3f484b3e6e
-
SHA256
caf865d460e97d3f1043fdade9be954436bb158f6101d3598d1334acfef400d3
-
SHA512
8dd0e0ec717afd64255c47424682d642b670d4c8d75deb169a9b433807d23651e79e94b7f78f8d954c19abd99aa332204c2f86df6af98928d2d8b0f0de3e6a8d
Static task
static1
Behavioral task
behavioral1
Sample
EMTECH IPH GROUP.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
EMTECH IPH GROUP.exe
Resource
win10v20210410
Malware Config
Extracted
warzonerat
185.157.160.215:2211
Targets
-
-
Target
EMTECH IPH GROUP.exe
-
Size
62KB
-
MD5
4b3470167aed6f5cba3103b3abaaa7c4
-
SHA1
6282b6635b89c19086e7e77aa508aa3f484b3e6e
-
SHA256
caf865d460e97d3f1043fdade9be954436bb158f6101d3598d1334acfef400d3
-
SHA512
8dd0e0ec717afd64255c47424682d642b670d4c8d75deb169a9b433807d23651e79e94b7f78f8d954c19abd99aa332204c2f86df6af98928d2d8b0f0de3e6a8d
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Drops startup file
-
Suspicious use of SetThreadContext
-