General
-
Target
Payment slip.exe
-
Size
4.3MB
-
Sample
221031-sbk3aabcb6
-
MD5
80ecd0b6e261e2e72110d34ccd296106
-
SHA1
17b4719a0068340ddfac521c9a413386a94c0dc1
-
SHA256
111bed7d916dd97f632da64fb1c99beb86ab4a2dc13c0b066a8e2ecf8cb2158e
-
SHA512
dae000acd0dbd514c2182dff2b3641834af29b2168a0a11a001afa7278106acd79770f1fc80513462c52d8dd5a871b52dd8b3ed9052aaca4b94f2b10d181a6ef
-
SSDEEP
24576:hvaxvPJCJdkd0H2ma1rNFqOsx+7C9hvP9T8nrcXC7VNlwH4mQf+asgAWN5r4mN8+:
Static task
static1
Behavioral task
behavioral1
Sample
Payment slip.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Payment slip.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
warzonerat
willia2.ddns.net:5059
Targets
-
-
Target
Payment slip.exe
-
Size
4.3MB
-
MD5
80ecd0b6e261e2e72110d34ccd296106
-
SHA1
17b4719a0068340ddfac521c9a413386a94c0dc1
-
SHA256
111bed7d916dd97f632da64fb1c99beb86ab4a2dc13c0b066a8e2ecf8cb2158e
-
SHA512
dae000acd0dbd514c2182dff2b3641834af29b2168a0a11a001afa7278106acd79770f1fc80513462c52d8dd5a871b52dd8b3ed9052aaca4b94f2b10d181a6ef
-
SSDEEP
24576:hvaxvPJCJdkd0H2ma1rNFqOsx+7C9hvP9T8nrcXC7VNlwH4mQf+asgAWN5r4mN8+:
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-