General
-
Target
8b4e770790cb4dfcc69cc2d0ed5e7b8f
-
Size
1.3MB
-
Sample
220720-mll5faedd5
-
MD5
8b4e770790cb4dfcc69cc2d0ed5e7b8f
-
SHA1
9523b8f7dcd1c73f4b9c4f329f046321e080fa3c
-
SHA256
2e49e90adfc14795aff520bec68a81a158407c2b85284b52d11dd0906cdf83bd
-
SHA512
6d6d9b13696a5135a138f4205fad44d4c0f527f6b086fe017055f9dbbbb991c379d6f074de0e9163a7322efc440583c9af29bf7041041324f44d6acf12786f02
Behavioral task
behavioral1
Sample
8b4e770790cb4dfcc69cc2d0ed5e7b8f.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
8b4e770790cb4dfcc69cc2d0ed5e7b8f.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Targets
-
-
Target
8b4e770790cb4dfcc69cc2d0ed5e7b8f
-
Size
1.3MB
-
MD5
8b4e770790cb4dfcc69cc2d0ed5e7b8f
-
SHA1
9523b8f7dcd1c73f4b9c4f329f046321e080fa3c
-
SHA256
2e49e90adfc14795aff520bec68a81a158407c2b85284b52d11dd0906cdf83bd
-
SHA512
6d6d9b13696a5135a138f4205fad44d4c0f527f6b086fe017055f9dbbbb991c379d6f074de0e9163a7322efc440583c9af29bf7041041324f44d6acf12786f02
Score10/10-
NetWire RAT payload
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-