General
-
Target
Payment copy.exe
-
Size
26KB
-
Sample
221103-jx9hbsaddn
-
MD5
ac8b8cdb5dbab70faced147a56718cc7
-
SHA1
76bef62765559588ffa3457a0df27bf0e29c5aa9
-
SHA256
7f7055a4e3cecdeffd1d86cb48153d91368394707e3c98564c3efbea09a13e5e
-
SHA512
eaac29f399a2779f673e852de3beaf94af5a428e023af17f196177f44e53a3ea68b51f8f49b2231fc2024b046b8bf3398b1a5cdc90ae3830f8f771f31b942a60
-
SSDEEP
384:q+NhC0phe4VxWt0W3J6T5fnfffff9CwZnptYcFmVc03K:rZpgP0W3Q/ZptYcFmVc6K
Static task
static1
Behavioral task
behavioral1
Sample
Payment copy.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Payment copy.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
warzonerat
willia2.ddns.net:5059
Targets
-
-
Target
Payment copy.exe
-
Size
26KB
-
MD5
ac8b8cdb5dbab70faced147a56718cc7
-
SHA1
76bef62765559588ffa3457a0df27bf0e29c5aa9
-
SHA256
7f7055a4e3cecdeffd1d86cb48153d91368394707e3c98564c3efbea09a13e5e
-
SHA512
eaac29f399a2779f673e852de3beaf94af5a428e023af17f196177f44e53a3ea68b51f8f49b2231fc2024b046b8bf3398b1a5cdc90ae3830f8f771f31b942a60
-
SSDEEP
384:q+NhC0phe4VxWt0W3J6T5fnfffff9CwZnptYcFmVc03K:rZpgP0W3Q/ZptYcFmVc6K
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-