General
-
Target
E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.exe
-
Size
586KB
-
Sample
221117-qf3f1sae21
-
MD5
1d84dc95d2a21666cc0038e0febd677f
-
SHA1
452fd7c779e820c05d046f8d78eac6ed9ce44980
-
SHA256
3ec75aa62228c2043c7834516a087d14fb0ff1cf89a060edb10cbd3e296e3fc4
-
SHA512
a4e9c81b319e4c40c3093aad239c4f05743c7d9c01d1c0df819d3d422b768e61aa2dae3c84090584d2d1f6ffd17d5a66ea00c85fa26a5b96422412427af84557
-
SSDEEP
12288:bDjeLlJcFNDJJCTbtCk1wvGMJfGb8/4OQL:bDiT6pyJcGMJfGw/LQL
Static task
static1
Behavioral task
behavioral1
Sample
E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
warzonerat
chexfotii.ddns.net:4545
Targets
-
-
Target
E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.exe
-
Size
586KB
-
MD5
1d84dc95d2a21666cc0038e0febd677f
-
SHA1
452fd7c779e820c05d046f8d78eac6ed9ce44980
-
SHA256
3ec75aa62228c2043c7834516a087d14fb0ff1cf89a060edb10cbd3e296e3fc4
-
SHA512
a4e9c81b319e4c40c3093aad239c4f05743c7d9c01d1c0df819d3d422b768e61aa2dae3c84090584d2d1f6ffd17d5a66ea00c85fa26a5b96422412427af84557
-
SSDEEP
12288:bDjeLlJcFNDJJCTbtCk1wvGMJfGb8/4OQL:bDiT6pyJcGMJfGw/LQL
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
ModiLoader Second Stage
-
Warzone RAT payload
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Modifies WinLogon
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-