General
-
Target
Equipment's A107 Prime Power Logistic.exe
-
Size
1.0MB
-
Sample
221109-ggvywsfghj
-
MD5
0ddbb8eedaca75c0acb0a034e1eae063
-
SHA1
93501b2d5019dcc2aa56c3e7bce76da4970b61ef
-
SHA256
7e0cfcc29e5cfaa2e149018b35bd3776fae867467ae2b91c65f7c873bf8f9a8a
-
SHA512
4135facb244dce9c18bd64c736cba8105001982bc309dc3dfb03cbdd1e079d8fcdb25fc9d50c425ba43ae3772848ec25b06dc1b6a5016ea45da53d4809fa3b9d
-
SSDEEP
24576:rAOcZGRABC2nDlqRpNFkHTr+Mo5pemHI0Yuyq3:t4DQR2xo5EmHWq3
Static task
static1
Behavioral task
behavioral1
Sample
Equipment's A107 Prime Power Logistic.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
Equipment's A107 Prime Power Logistic.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
warzonerat
chexfotii.ddns.net:4545
Targets
-
-
Target
Equipment's A107 Prime Power Logistic.exe
-
Size
1.0MB
-
MD5
0ddbb8eedaca75c0acb0a034e1eae063
-
SHA1
93501b2d5019dcc2aa56c3e7bce76da4970b61ef
-
SHA256
7e0cfcc29e5cfaa2e149018b35bd3776fae867467ae2b91c65f7c873bf8f9a8a
-
SHA512
4135facb244dce9c18bd64c736cba8105001982bc309dc3dfb03cbdd1e079d8fcdb25fc9d50c425ba43ae3772848ec25b06dc1b6a5016ea45da53d4809fa3b9d
-
SSDEEP
24576:rAOcZGRABC2nDlqRpNFkHTr+Mo5pemHI0Yuyq3:t4DQR2xo5EmHWq3
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Executes dropped EXE
-
Sets DLL path for service in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-