General
-
Target
text.exe
-
Size
1.1MB
-
Sample
210723-94dsyzav2n
-
MD5
08e321e2f7a4fceebed7d9330c7e627b
-
SHA1
2049c1f290d542fba9690958d97c25c0f9d2b39d
-
SHA256
670a52daaf17c5925d5cb33c03e849a863f11f153d438519ec3c71083a90167b
-
SHA512
f3ed6cf7f15f65878d547be2853376602236d4364f6d53566b8169fc05b26454c031f3b7b5630c5dd340054fdca81fe69f569aad9b1cc06cdef751f7eac3d1f1
Static task
static1
Behavioral task
behavioral1
Sample
text.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
text.exe
Resource
win10v20210408
Malware Config
Extracted
warzonerat
5.226.138.94:6621
Targets
-
-
Target
text.exe
-
Size
1.1MB
-
MD5
08e321e2f7a4fceebed7d9330c7e627b
-
SHA1
2049c1f290d542fba9690958d97c25c0f9d2b39d
-
SHA256
670a52daaf17c5925d5cb33c03e849a863f11f153d438519ec3c71083a90167b
-
SHA512
f3ed6cf7f15f65878d547be2853376602236d4364f6d53566b8169fc05b26454c031f3b7b5630c5dd340054fdca81fe69f569aad9b1cc06cdef751f7eac3d1f1
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Suspicious use of SetThreadContext
-