General
-
Target
c.exe
-
Size
646KB
-
Sample
211005-yx9wesace9
-
MD5
a407a9e919f37eda0b74df064a31a843
-
SHA1
04191da2670b4bc4ef5db5dad14441fd154b35ea
-
SHA256
8881bb086bc2b6a89b09a8fb1d72458a34a5457ab073ddb14c3ead6e2ec65a8a
-
SHA512
7bcd90e05b4933e0d40d82c0a249573ee9d42231360c42e77b74efd9d6955c1fc8b95af6e219b4d31d3babce8a1fa7ab9f729461a4b3007845273e9a7783c4a1
Static task
static1
Behavioral task
behavioral1
Sample
c.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
c.exe
Resource
win10v20210408
Malware Config
Extracted
warzonerat
176.126.86.243:2021
Targets
-
-
Target
c.exe
-
Size
646KB
-
MD5
a407a9e919f37eda0b74df064a31a843
-
SHA1
04191da2670b4bc4ef5db5dad14441fd154b35ea
-
SHA256
8881bb086bc2b6a89b09a8fb1d72458a34a5457ab073ddb14c3ead6e2ec65a8a
-
SHA512
7bcd90e05b4933e0d40d82c0a249573ee9d42231360c42e77b74efd9d6955c1fc8b95af6e219b4d31d3babce8a1fa7ab9f729461a4b3007845273e9a7783c4a1
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-