General
-
Target
SOA & UNPAID INVOICES.pdf.exe
-
Size
670KB
-
Sample
220521-g4rjzsaec5
-
MD5
b6e3ea3ca41fadf4b2d8e8c4547bbb3b
-
SHA1
dbd634b213e1dba07b9d3cb4b880d2db158818f7
-
SHA256
a9e823696e9c25dda75eae39878e430238e78b379bb51a0658d8fd93bd2c604d
-
SHA512
ecc6d1b83eada0530986c3357a56b51253686bc3db150601daf8cca0dce4db0349a4ec75bb702c808aee2c5618bdb120d8ba249b20fa9426d6983f7d4516fa29
Static task
static1
Behavioral task
behavioral1
Sample
SOA & UNPAID INVOICES.pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SOA & UNPAID INVOICES.pdf.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
warzonerat
76.8.53.133:1198
Targets
-
-
Target
SOA & UNPAID INVOICES.pdf.exe
-
Size
670KB
-
MD5
b6e3ea3ca41fadf4b2d8e8c4547bbb3b
-
SHA1
dbd634b213e1dba07b9d3cb4b880d2db158818f7
-
SHA256
a9e823696e9c25dda75eae39878e430238e78b379bb51a0658d8fd93bd2c604d
-
SHA512
ecc6d1b83eada0530986c3357a56b51253686bc3db150601daf8cca0dce4db0349a4ec75bb702c808aee2c5618bdb120d8ba249b20fa9426d6983f7d4516fa29
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Sets DLL path for service in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Modifies WinLogon
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-