General
-
Target
E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.tar
-
Size
588KB
-
Sample
221117-p8nb5aad9w
-
MD5
0df60e942304cd709d8b7c64567926c0
-
SHA1
55b3b53dfc1151c173051bc1b36fe9a89d09cd3c
-
SHA256
b038110e09ae5a44a0819b104ae1e5a6a422fb80b60eeecb1e2cde1af22a359b
-
SHA512
a319089e4c866c6403046783590ba68103a493116f1bc5d89704bf8f91de471f24896ba53e7945b71c636e4926999e769b81f6c87e2ec853b92b2d1635524c32
-
SSDEEP
12288:uDjeLlJcFNDJJCTbtCk1wvGMJfGb8/4OQL:uDiT6pyJcGMJfGw/LQL
Static task
static1
Behavioral task
behavioral1
Sample
E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
warzonerat
chexfotii.ddns.net:4545
Targets
-
-
Target
E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.exe
-
Size
586KB
-
MD5
1d84dc95d2a21666cc0038e0febd677f
-
SHA1
452fd7c779e820c05d046f8d78eac6ed9ce44980
-
SHA256
3ec75aa62228c2043c7834516a087d14fb0ff1cf89a060edb10cbd3e296e3fc4
-
SHA512
a4e9c81b319e4c40c3093aad239c4f05743c7d9c01d1c0df819d3d422b768e61aa2dae3c84090584d2d1f6ffd17d5a66ea00c85fa26a5b96422412427af84557
-
SSDEEP
12288:bDjeLlJcFNDJJCTbtCk1wvGMJfGb8/4OQL:bDiT6pyJcGMJfGw/LQL
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
ModiLoader Second Stage
-
Warzone RAT payload
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Adds Run key to start application
-
Modifies WinLogon
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-