General
-
Target
d38a592a34803dd43fec1722a4467822.exe
-
Size
438KB
-
Sample
210912-rrvqzsfdbm
-
MD5
d38a592a34803dd43fec1722a4467822
-
SHA1
2fa62ad88fe9ed8ff915087692020ea0b84f56ae
-
SHA256
d01e5dc3618708c0affe1be008e9d356fe7d113289dc68bc832d556788adeba1
-
SHA512
d85d6783fbc10399f808b1667848c4d46571da9b271dfa7deebff08703d3a90d2eba2e932a692a672aa4d9809f39bb73ab8b44dc7e12bb6afe4065da04a120a3
Static task
static1
Behavioral task
behavioral1
Sample
d38a592a34803dd43fec1722a4467822.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
d38a592a34803dd43fec1722a4467822.exe
Resource
win10-en
Malware Config
Extracted
warzonerat
pubg.ddns.net:5201
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
x1x1x1x1x1
pubg.ddns.net:147
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Targets
-
-
Target
d38a592a34803dd43fec1722a4467822.exe
-
Size
438KB
-
MD5
d38a592a34803dd43fec1722a4467822
-
SHA1
2fa62ad88fe9ed8ff915087692020ea0b84f56ae
-
SHA256
d01e5dc3618708c0affe1be008e9d356fe7d113289dc68bc832d556788adeba1
-
SHA512
d85d6783fbc10399f808b1667848c4d46571da9b271dfa7deebff08703d3a90d2eba2e932a692a672aa4d9809f39bb73ab8b44dc7e12bb6afe4065da04a120a3
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
suricata: ET MALWARE Generic njRAT/Bladabindi CnC Activity (ll)
-
Warzone RAT Payload
-
Executes dropped EXE
-
Drops startup file
-
Loads dropped DLL
-
Adds Run key to start application
-