General
-
Target
592bef1e0325ada505ec4875d5727bc1.exe
-
Size
2.1MB
-
Sample
221120-t1cymsae98
-
MD5
592bef1e0325ada505ec4875d5727bc1
-
SHA1
d6c6aa187d2b5aaff512c12948a426584382e92c
-
SHA256
83b8c34a7c66b407be941e59a9ce7a84ee81a8dfad3cea67e86118e96221c749
-
SHA512
38410a737b63a6cf123b08b74e836e75189ce6dae8d4491b4deab5791eff29a824be24d3d70a53ccaf3137222d79253385be5180fffc1e98a0a9c11b1b1e8d3e
-
SSDEEP
49152:tBUOgQLgF1CiOBInpLNAZpCY3iEO+IVG5r:nU7CCtOmFNAP6O
Static task
static1
Behavioral task
behavioral1
Sample
592bef1e0325ada505ec4875d5727bc1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
592bef1e0325ada505ec4875d5727bc1.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
warzonerat
45.139.105.147:5200
Extracted
marsstealer
Default
data.topababa.com/gate.php
Extracted
bitrat
1.38
45.139.105.147:1234
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
temp
-
install_file
svchost
-
tor_process
tor
Targets
-
-
Target
592bef1e0325ada505ec4875d5727bc1.exe
-
Size
2.1MB
-
MD5
592bef1e0325ada505ec4875d5727bc1
-
SHA1
d6c6aa187d2b5aaff512c12948a426584382e92c
-
SHA256
83b8c34a7c66b407be941e59a9ce7a84ee81a8dfad3cea67e86118e96221c749
-
SHA512
38410a737b63a6cf123b08b74e836e75189ce6dae8d4491b4deab5791eff29a824be24d3d70a53ccaf3137222d79253385be5180fffc1e98a0a9c11b1b1e8d3e
-
SSDEEP
49152:tBUOgQLgF1CiOBInpLNAZpCY3iEO+IVG5r:nU7CCtOmFNAP6O
-
Modifies security service
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Executes dropped EXE
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-