General
-
Target
Medgulf PO.exe
-
Size
21KB
-
Sample
220705-hnmrjaegfq
-
MD5
fc08864032d1bc58016be58bb1257da8
-
SHA1
fb561bebaac8d5a3f2686071c8c0666af183e188
-
SHA256
6a6e1823ba802e69315de8833ea7038289a51cb28f330fb359dc821d4923408c
-
SHA512
4cb9c9863e8f716f4f987271b39f5ead42f47ad9a39f00a39e87621bb996fffdbf30f78b7e1a915d1344aab126b643f94c873b4f2d01adf2b3c9920ee07dfcec
Static task
static1
Behavioral task
behavioral1
Sample
Medgulf PO.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Medgulf PO.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
Medgulf PO.exe
-
Size
21KB
-
MD5
fc08864032d1bc58016be58bb1257da8
-
SHA1
fb561bebaac8d5a3f2686071c8c0666af183e188
-
SHA256
6a6e1823ba802e69315de8833ea7038289a51cb28f330fb359dc821d4923408c
-
SHA512
4cb9c9863e8f716f4f987271b39f5ead42f47ad9a39f00a39e87621bb996fffdbf30f78b7e1a915d1344aab126b643f94c873b4f2d01adf2b3c9920ee07dfcec
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT Payload
-
Executes dropped EXE
-
Modifies Windows Firewall
-
Sets DLL path for service in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Modifies WinLogon
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-