General
-
Target
TSDPL for GSTR3b.cab
-
Size
365KB
-
Sample
221124-ba65page92
-
MD5
d4089af74af461050d7c7162f9676f84
-
SHA1
d65ea1af884c6725fa450a520869f5297a1b7564
-
SHA256
42b61aba751c011b37720d8ca0ef81d113f24162fde40eda6f4bcfc1c51f669d
-
SHA512
eb2f480864afa4dc2821a69467b4cb3d199bb63cbc1f3f3435da023cc2ddd49ef96000e464c5146271ba68132836f12fe706c96db01031dc45b45c487241be95
-
SSDEEP
6144:u8HzG9f3yHFuvEMTe3Mrhkm2E3LOPcJX3eDQ+ysNX/Z53PYxpM2fINMYa:u8HzGB3yHFJGQKnT+yK3YxN
Static task
static1
Behavioral task
behavioral1
Sample
TSDPL for GSTR3b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
TSDPL for GSTR3b.exe
Resource
win10v2004-20221111-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1Dbjqv3kYu9z-oWAyCtOblfNRuOjXFyFa
Extracted
warzonerat
nightmare4666.ddns.net:2442
Targets
-
-
Target
TSDPL for GSTR3b.exe
-
Size
813KB
-
MD5
96687cb64b98418c573ee65753a72e33
-
SHA1
d20ada54342596cd29bf7f66bc86d4503c4cfea4
-
SHA256
c410af32a481222f15dd9babe626182317e7d76d603d2eb001cccd213a258873
-
SHA512
b9f4e51985e839ece1f1bfb74ce1c0ffa232f848cdbef5a1c65ed3e703096074b779b509c1369060a96e924d4eae7e80049639e886923271b4d576ca725746b9
-
SSDEEP
12288:vOrAkZrlpZxc3NKqgw9ONuRJooNN5dHVqTdTB2O4rwSMpxwhxjgV:vs3hp4c6/n5q5oOqLM2x0V
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
ModiLoader Second Stage
-
Warzone RAT payload
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-