General
-
Target
640cd3c54e536bc56eb35e4ab5a2b965b7d740fc13ac83b0a0d4237512ec56ef
-
Size
499KB
-
Sample
221209-ajelcsbh77
-
MD5
daee9657e1613ba746d9470ee136df63
-
SHA1
abe11c2929bacc09410efc649f9c2dffb1895db0
-
SHA256
66c0a5757c93f2e87a7f25263dc3c3f5af3a3e09c5829c942ee7ebe464780752
-
SHA512
09e3af697cbdb36f2c9d5316c95a85a763a1181b8d3560fb15351db5dea0611a5164c1d2322724b7077bd453907d442ea73e2a968540d6fcc3361cca155a27d1
-
SSDEEP
6144:cUXgaj2XTZax6QIiP3imiTRccGXKhlwP7j6GlZoLkbBBKB4jF1L5NEe8xOXqAHoe:cUQn5TRTlhWPv6mqQaK9f+Aqg1fGg1Em
Static task
static1
Behavioral task
behavioral1
Sample
640cd3c54e536bc56eb35e4ab5a2b965b7d740fc13ac83b0a0d4237512ec56ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
640cd3c54e536bc56eb35e4ab5a2b965b7d740fc13ac83b0a0d4237512ec56ef.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
warzonerat
dnuocc.com:5200
Targets
-
-
Target
640cd3c54e536bc56eb35e4ab5a2b965b7d740fc13ac83b0a0d4237512ec56ef
-
Size
800KB
-
MD5
25d10c1c957744485ee6c6f68285e4a1
-
SHA1
49673bbf62d6c73a1358ad2da2b803d6d96249cd
-
SHA256
640cd3c54e536bc56eb35e4ab5a2b965b7d740fc13ac83b0a0d4237512ec56ef
-
SHA512
4e27b9b6fe1c8fc22f284c46abdc88b9464b39d846f4fe0e6b1c813644f99ac41f481991d851b6b64eece690265eaeba0a65f2e5ba64486c31ed5c2d687103ca
-
SSDEEP
12288:qnYVrTlh6Pv6mq0aKxv+yq81CLehz/khAIi3pIOZe:bFP6ZtBO8+VCe
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-