General
-
Target
446a385b78c169ee2cf201419f8451f4.exe
-
Size
270KB
-
Sample
221123-21d5psec81
-
MD5
446a385b78c169ee2cf201419f8451f4
-
SHA1
faf0863d1742ad2f73708cd57abd1a00bad70efa
-
SHA256
93d8270cf8904624572540c924610458e0eb7984afc5c744eeda2e50ad5024c2
-
SHA512
ff9ab8057c9d76e2b1e12a7a9818258b18d93ed0addc94c93330156b72de21d349de072104915c0a232b4bbf6415afbde7816d06de09978a6c984fe481f9b225
-
SSDEEP
6144:HEa0eDyf/UBrohN9DYNOgcdj+vdIHK+1vZ+o4PI:LdNsgKj8eHKnzPI
Static task
static1
Behavioral task
behavioral1
Sample
446a385b78c169ee2cf201419f8451f4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
446a385b78c169ee2cf201419f8451f4.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
warzonerat
maulo.duckdns.org:6269
Targets
-
-
Target
446a385b78c169ee2cf201419f8451f4.exe
-
Size
270KB
-
MD5
446a385b78c169ee2cf201419f8451f4
-
SHA1
faf0863d1742ad2f73708cd57abd1a00bad70efa
-
SHA256
93d8270cf8904624572540c924610458e0eb7984afc5c744eeda2e50ad5024c2
-
SHA512
ff9ab8057c9d76e2b1e12a7a9818258b18d93ed0addc94c93330156b72de21d349de072104915c0a232b4bbf6415afbde7816d06de09978a6c984fe481f9b225
-
SSDEEP
6144:HEa0eDyf/UBrohN9DYNOgcdj+vdIHK+1vZ+o4PI:LdNsgKj8eHKnzPI
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-