General
-
Target
Shipment Document BLINV and Packing list.exe
-
Size
28KB
-
Sample
211008-tx4xysefg2
-
MD5
27b39b21bafc4a47a9504ecff0e785d7
-
SHA1
531ab011827017043933ca264729487265961975
-
SHA256
bcc35ce72f7559e9cd1431d3fa0f7ed33cd7f3b5d0cb21970c8e399296527469
-
SHA512
5a866c1659d13129b96de5ac736005cf227182d10212ad45a56976cbbf2e7a588ca8967fe66d05dc3220b495bfc717823fdcddd0bf18b4b69eaa711bb0c2ff40
Static task
static1
Behavioral task
behavioral1
Sample
Shipment Document BLINV and Packing list.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Shipment Document BLINV and Packing list.exe
Resource
win10v20210408
Malware Config
Extracted
warzonerat
enginekeysmoney.ddns.net:9671
Targets
-
-
Target
Shipment Document BLINV and Packing list.exe
-
Size
28KB
-
MD5
27b39b21bafc4a47a9504ecff0e785d7
-
SHA1
531ab011827017043933ca264729487265961975
-
SHA256
bcc35ce72f7559e9cd1431d3fa0f7ed33cd7f3b5d0cb21970c8e399296527469
-
SHA512
5a866c1659d13129b96de5ac736005cf227182d10212ad45a56976cbbf2e7a588ca8967fe66d05dc3220b495bfc717823fdcddd0bf18b4b69eaa711bb0c2ff40
-
Modifies WinLogon for persistence
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-