General
-
Target
80a4585a955dc377872e19eac82f8b92
-
Size
761KB
-
Sample
220914-nsh7ssdhar
-
MD5
80a4585a955dc377872e19eac82f8b92
-
SHA1
ff090858ed1ccb48b1edf35ac2119ca2ec6580be
-
SHA256
b5a03025f7f14a83040a5aea0905ae1a2baaf132fe10cdc1483e6012adb75cb5
-
SHA512
2e514e8c6de930a12227c27e1b2e1a887aaa435b1d2b0f5c047435e659915221da6cefde1d1bdbf98bad5ee1daa89b218b76c37d3c5433bf72691895cb679927
-
SSDEEP
12288:yGf8Fr7pdba5e1Cw11P+0Nj6jxlFD84CegdBqhwjfDZ/OSMfAT6HvIH0ZbTHX:XExj112c6jPgdppOSE55ZbTHX
Static task
static1
Behavioral task
behavioral1
Sample
Uj bejelentkezEsi adatai·pdf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Uj bejelentkezEsi adatai·pdf.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
warzonerat
171.22.30.72:5151
Targets
-
-
Target
Uj bejelentkezEsi adatai·pdf.exe
-
Size
864KB
-
MD5
bb5eef6ab8be4b744a9d31e3e07f639a
-
SHA1
f39a49aad31cc0188f985d789deefaa74329b993
-
SHA256
21d09c77de01cc95209727752e866221ad3b66d5233ab52cfe5249a3867ef8d8
-
SHA512
297fe7d56d770df96719e00bcb63294503c07507edd5ddafdec7f4f7866e6b41f93ab786575a899411b8633bbaee17f5f7c4efed175e2794ba05a8392e3b9445
-
SSDEEP
6144:jswxmS3Prp/fcCNjhIJqUAhsbgDQ6qs3PrVeFJIeUSZkyuWGsQJjOE5De9jCCjL1:VxZPtZIEtcV0edmTZskDuVZQY
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Looks for VirtualBox Guest Additions in registry
-
Warzone RAT payload
-
Executes dropped EXE
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-