General
-
Target
80e28fcc8b571c2c8fe075896d03ed473e825bb56296563f3d5dffaa22fe0ccb
-
Size
160KB
-
Sample
221208-3fhg3abh26
-
MD5
edf1ab139bc72ac7133dacc5d95cbd57
-
SHA1
b62c033f5271f5e504b352f39f7e09aae44c6661
-
SHA256
a69987b46ee73ff3ef7eca546f7e1029f3f8ad62847e0c9b1258f7571dce240b
-
SHA512
4ebeef583a20a2d694e99d35752ce1454e26a77cbc6edaa6a4acd2db62bb12f2518ee039adf389ed84a48809547d5dbfd5466b1cd8fea50232db914fffc21634
-
SSDEEP
3072:ubHwln9xyw9H5bnLVk72y5KPzTYsbrPQwya2RIPNUwizl4LxnE9fWcTcbdX6k:yHwl9xBbkn5QzTY2Ply1yNUwEChE9fWR
Static task
static1
Behavioral task
behavioral1
Sample
80e28fcc8b571c2c8fe075896d03ed473e825bb56296563f3d5dffaa22fe0ccb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
80e28fcc8b571c2c8fe075896d03ed473e825bb56296563f3d5dffaa22fe0ccb.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
warzonerat
baramac.duckdns.org:6269
Targets
-
-
Target
80e28fcc8b571c2c8fe075896d03ed473e825bb56296563f3d5dffaa22fe0ccb
-
Size
326KB
-
MD5
db11e583944ddefc276fd302c0eecf39
-
SHA1
662c88e0753e7d006ab7cc43297613a7cb5d811d
-
SHA256
80e28fcc8b571c2c8fe075896d03ed473e825bb56296563f3d5dffaa22fe0ccb
-
SHA512
b58c03d09490ae7a66b9a40c5bb92b5636144b727e1e0bb4947a9f2894dc65cbb95f15f960bc0f1078833efdaf345de7f9a0894cd139cf783d34e368cb2e1dcf
-
SSDEEP
6144:LBnmyK4O/ekC2y6gPXoYBIy1yNUwEghE9fWYJK6:Q7e6gPYYBDy6wEghE9fWYD
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-