General
-
Target
Oyqpjkectdtied.exe
-
Size
730KB
-
Sample
221101-zntcrafgfp
-
MD5
3792db21c47b73406757ef3e6f6f02fb
-
SHA1
4f640e00c72d15f6585f6b5bda0e9a6b3c7a6be1
-
SHA256
4cf4313d499e9400a60a0961344e6df29acc85e6d62e18c118bef1493f801e53
-
SHA512
9a99d08bbf2d2eb38b7f661240284b69c946215820b4c3759b8f4b779248f516c65b3ea0d8c71b071798321834253095e6064388f9096d399ef7ee53fe9fdf05
-
SSDEEP
12288:cmkj8E72nMvEp9K8jfCRxsvUTGifrMReP0+ax+6m23m23msffffffffffffffffz:uAECSEp9ljfCmUTvfYRB+ax+6m23m23R
Static task
static1
Behavioral task
behavioral1
Sample
Oyqpjkectdtied.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Oyqpjkectdtied.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
warzonerat
samguys2.duckdns.org:1430
Targets
-
-
Target
Oyqpjkectdtied.exe
-
Size
730KB
-
MD5
3792db21c47b73406757ef3e6f6f02fb
-
SHA1
4f640e00c72d15f6585f6b5bda0e9a6b3c7a6be1
-
SHA256
4cf4313d499e9400a60a0961344e6df29acc85e6d62e18c118bef1493f801e53
-
SHA512
9a99d08bbf2d2eb38b7f661240284b69c946215820b4c3759b8f4b779248f516c65b3ea0d8c71b071798321834253095e6064388f9096d399ef7ee53fe9fdf05
-
SSDEEP
12288:cmkj8E72nMvEp9K8jfCRxsvUTGifrMReP0+ax+6m23m23msffffffffffffffffz:uAECSEp9ljfCmUTvfYRB+ax+6m23m23R
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
ModiLoader Second Stage
-
Warzone RAT payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-