General
-
Target
640cd3c54e536bc56eb35e4ab5a2b965b7d740fc13ac83b0a0d4237512ec56ef
-
Size
499KB
-
Sample
221209-c8n77sfa7z
-
MD5
449df39d7ce86219f1386d9a592d77ed
-
SHA1
6f8f2825a80a877f53a8c93ae31f3d52a9cc1773
-
SHA256
f258b1104425f360866e1453f163265f7dfe53c627ab1c8525c2cd928cd0dd55
-
SHA512
e849960d1723bee4a9df86cb46f262b0f3d4a5a27dbe070b84eb81508f80cd3a62918b69af756819ba6d88760979b9257ae07c1b57a5c0eb74e1e1a975890d17
-
SSDEEP
6144:VUXgaj2XTZax6QIiP3imiTRccGXKhlwP7j6GlZoLkbBBKB4jF1L5NEe8xOXqAHo/:VUQn5TRTlhWPv6mqQaK9f+Aqg1fGg1En
Static task
static1
Behavioral task
behavioral1
Sample
640cd3c54e536bc56eb35e4ab5a2b965b7d740fc13ac83b0a0d4237512ec56ef.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
640cd3c54e536bc56eb35e4ab5a2b965b7d740fc13ac83b0a0d4237512ec56ef.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
warzonerat
dnuocc.com:5200
Targets
-
-
Target
640cd3c54e536bc56eb35e4ab5a2b965b7d740fc13ac83b0a0d4237512ec56ef
-
Size
800KB
-
MD5
25d10c1c957744485ee6c6f68285e4a1
-
SHA1
49673bbf62d6c73a1358ad2da2b803d6d96249cd
-
SHA256
640cd3c54e536bc56eb35e4ab5a2b965b7d740fc13ac83b0a0d4237512ec56ef
-
SHA512
4e27b9b6fe1c8fc22f284c46abdc88b9464b39d846f4fe0e6b1c813644f99ac41f481991d851b6b64eece690265eaeba0a65f2e5ba64486c31ed5c2d687103ca
-
SSDEEP
12288:qnYVrTlh6Pv6mq0aKxv+yq81CLehz/khAIi3pIOZe:bFP6ZtBO8+VCe
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-