General
-
Target
a2392a5423e76cc1046e4d25f6a62771.exe
-
Size
3.6MB
-
Sample
220922-r9we8sfebm
-
MD5
a2392a5423e76cc1046e4d25f6a62771
-
SHA1
08c6d2bd8777037aa0e77b8937e285002d3a4f23
-
SHA256
bdeab97a1a23c98b3a53d4c7d6c60276597ca67bd80f5d622ccc20b3d703f756
-
SHA512
b778fb1419ad63527b5d504145fcec193d994646d20fd3a96f7bd0c55f26e5882abab69e4b99bf5116b16a6e9746226f5bc69113fc43ca856773a867ddaa3ed1
-
SSDEEP
98304:IE7qm9FINlmzCTadUwYCQs+J7zU0RYvUc:IfJ+CSUw/p+hRYvUc
Static task
static1
Behavioral task
behavioral1
Sample
a2392a5423e76cc1046e4d25f6a62771.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a2392a5423e76cc1046e4d25f6a62771.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
warzonerat
sheet.duckdns.org:4110
Extracted
bitrat
1.38
sheet.duckdns.org:8471
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
Install path
-
install_file
Install name
-
tor_process
tor
Targets
-
-
Target
a2392a5423e76cc1046e4d25f6a62771.exe
-
Size
3.6MB
-
MD5
a2392a5423e76cc1046e4d25f6a62771
-
SHA1
08c6d2bd8777037aa0e77b8937e285002d3a4f23
-
SHA256
bdeab97a1a23c98b3a53d4c7d6c60276597ca67bd80f5d622ccc20b3d703f756
-
SHA512
b778fb1419ad63527b5d504145fcec193d994646d20fd3a96f7bd0c55f26e5882abab69e4b99bf5116b16a6e9746226f5bc69113fc43ca856773a867ddaa3ed1
-
SSDEEP
98304:IE7qm9FINlmzCTadUwYCQs+J7zU0RYvUc:IfJ+CSUw/p+hRYvUc
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-