General
-
Target
84cc7b5b7b1cd8448cf5529f493a6882016e75c85da54baa30e95fe32452f780
-
Size
176KB
-
Sample
230316-e3cckabc5y
-
MD5
f2e4e0ba9fc3fe9d2229c31c4a5a40d0
-
SHA1
835ddaa41c2111632f4564f200dbceb969851f1e
-
SHA256
84cc7b5b7b1cd8448cf5529f493a6882016e75c85da54baa30e95fe32452f780
-
SHA512
39abfa17838eb52e393041a8f2f1f8e47a88a26fb644ceeb4322d93d3fe82ab016a023b42569a3d58e079f837b606877a42c05e0855f7b2936fe3ab4d28612a5
-
SSDEEP
3072:WfY/TU9fE9PEtuRbrDbPTMuOqCw5NQhDd3+4/qxvVHY0MLtTtQS0W1KHdqML:AYa6XrDbP6vw5ipvgvVHY0UTSJ9l
Static task
static1
Behavioral task
behavioral1
Sample
84cc7b5b7b1cd8448cf5529f493a6882016e75c85da54baa30e95fe32452f780.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
warzonerat
omerlan.duckdns.org:6548
Targets
-
-
Target
84cc7b5b7b1cd8448cf5529f493a6882016e75c85da54baa30e95fe32452f780
-
Size
176KB
-
MD5
f2e4e0ba9fc3fe9d2229c31c4a5a40d0
-
SHA1
835ddaa41c2111632f4564f200dbceb969851f1e
-
SHA256
84cc7b5b7b1cd8448cf5529f493a6882016e75c85da54baa30e95fe32452f780
-
SHA512
39abfa17838eb52e393041a8f2f1f8e47a88a26fb644ceeb4322d93d3fe82ab016a023b42569a3d58e079f837b606877a42c05e0855f7b2936fe3ab4d28612a5
-
SSDEEP
3072:WfY/TU9fE9PEtuRbrDbPTMuOqCw5NQhDd3+4/qxvVHY0MLtTtQS0W1KHdqML:AYa6XrDbP6vw5ipvgvVHY0UTSJ9l
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-