General
-
Target
020824c1dfea0166bf1bfe3ce59af7a7.exe
-
Size
2MB
-
Sample
221005-beftasdac7
-
MD5
020824c1dfea0166bf1bfe3ce59af7a7
-
SHA1
e691e2f4607af277472ae32df75c4c42ff94b84c
-
SHA256
9bc9e9a3db288348e68fbf59c43df4ed9cc72a029aa70a31e0d7f325bf05b381
-
SHA512
025d92d41a81455513daccca997f396fe393909d7b388ec6f05b8eac5feef91e9996aa263501ac1b74962a40c5d9ce190df2be97f21bbfa8146c63cec6cda6b2
-
SSDEEP
49152:J6oUM9eEZyfky3a7B9L787fYIdLVYZcl+:RUMHyR3sB9q7CKA
Static task
static1
Behavioral task
behavioral1
Sample
020824c1dfea0166bf1bfe3ce59af7a7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
020824c1dfea0166bf1bfe3ce59af7a7.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
darkcomet
New-July-July4-02
dgorijan20785.hopto.org:35800
DC_MUTEX-JFYU2BC
-
gencode
UkVkDi2EZxxn
-
install
false
-
offline_keylogger
true
-
password
hhhhhh
-
persistence
false
Extracted
warzonerat
45.74.4.244:5199
dgorijan20785.hopto.org:5199
Extracted
asyncrat
0.5.6A
45.74.4.244:6606
45.74.4.244:7707
45.74.4.244:8808
servtle284
-
delay
5
-
install
true
-
install_file
wintskl.exe
-
install_folder
%AppData%
Extracted
darkcomet
New-July-July4-0
45.74.4.244:35800
DC_MUTEX-RT27KF0
-
gencode
cKUHbX2GsGhs
-
install
false
-
offline_keylogger
true
-
password
hhhhhh
-
persistence
false
Targets
-
-
Target
020824c1dfea0166bf1bfe3ce59af7a7.exe
-
Size
2MB
-
MD5
020824c1dfea0166bf1bfe3ce59af7a7
-
SHA1
e691e2f4607af277472ae32df75c4c42ff94b84c
-
SHA256
9bc9e9a3db288348e68fbf59c43df4ed9cc72a029aa70a31e0d7f325bf05b381
-
SHA512
025d92d41a81455513daccca997f396fe393909d7b388ec6f05b8eac5feef91e9996aa263501ac1b74962a40c5d9ce190df2be97f21bbfa8146c63cec6cda6b2
-
SSDEEP
49152:J6oUM9eEZyfky3a7B9L787fYIdLVYZcl+:RUMHyR3sB9q7CKA
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Async RAT payload
-
Warzone RAT payload
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-