General
-
Target
E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.tar.bz2
-
Size
290KB
-
Sample
221118-ba41bscb8v
-
MD5
bc9426d394993549487069db1fae9e97
-
SHA1
cc2ad58920ee368e89fa091fc200611a866c2a5a
-
SHA256
4c7691f624522e1677014a57de1be3d58f8b499f51b703f50d4fe4a73ef6db3c
-
SHA512
f375238c55cdb8a7a37cd1b80474824cd0f1343c2a968d42437739aa32545df0f9890d6b985ae54b61851b8f2150e6c7f2e38bda387cc4f0178c5f7d0ddb07f7
-
SSDEEP
6144:VTmMkOpWE5pEyuvfe6DMbIpRQSvjjb2caUCp9s989k8z2A56Y:VTm3Oo7DM6RQSvj7UpQQ6AoY
Static task
static1
Behavioral task
behavioral1
Sample
E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
warzonerat
chexfotii.ddns.net:4545
Targets
-
-
Target
E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.exe
-
Size
586KB
-
MD5
1d84dc95d2a21666cc0038e0febd677f
-
SHA1
452fd7c779e820c05d046f8d78eac6ed9ce44980
-
SHA256
3ec75aa62228c2043c7834516a087d14fb0ff1cf89a060edb10cbd3e296e3fc4
-
SHA512
a4e9c81b319e4c40c3093aad239c4f05743c7d9c01d1c0df819d3d422b768e61aa2dae3c84090584d2d1f6ffd17d5a66ea00c85fa26a5b96422412427af84557
-
SSDEEP
12288:bDjeLlJcFNDJJCTbtCk1wvGMJfGb8/4OQL:bDiT6pyJcGMJfGw/LQL
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
ModiLoader Second Stage
-
Warzone RAT payload
-
Sets DLL path for service in the registry
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Modifies WinLogon
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-