General
-
Target
d94f93beb5e5cafbed05b68b50b89a01.bin
-
Size
689KB
-
Sample
230316-gtzgvahc72
-
MD5
e2c3cc567c4614834ef8a0aedf080f27
-
SHA1
b9a7260dc7b6f9da8be8ec267fbb2e96d5ae6eeb
-
SHA256
7a1044d3884b5356ef32f799b77e98da1b618c22b412be9107045023241a0b4d
-
SHA512
2ee44f0c8719be5add774992aa51afd2f9d9a119f1b5099a9539a423b330f5c743cbe6fb70e6cafcc4f5a7b4dcdc9d2956a8f69662d14287cdc2d821719437e8
-
SSDEEP
12288:BdA8XAvJ7OpyhAlNHUgV3ZcimbrztpZ8amB2t+Yzg9naJ8XuR2cNUtgnTm1Wy+1v:zA8XABSpy+N/NDutpZ8amB2cYz2SHm1k
Static task
static1
Behavioral task
behavioral1
Sample
adb09eb6718421aff9cfd0dd2188ceab7c52e4c1f33ff3b3e56d37e8b09aadd1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
adb09eb6718421aff9cfd0dd2188ceab7c52e4c1f33ff3b3e56d37e8b09aadd1.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
warzonerat
74.201.28.114:3900
Targets
-
-
Target
adb09eb6718421aff9cfd0dd2188ceab7c52e4c1f33ff3b3e56d37e8b09aadd1.bin
-
Size
778KB
-
MD5
d94f93beb5e5cafbed05b68b50b89a01
-
SHA1
fb828f7fdf2aa5b83efef41754ba6c8b4a437b84
-
SHA256
adb09eb6718421aff9cfd0dd2188ceab7c52e4c1f33ff3b3e56d37e8b09aadd1
-
SHA512
3f2fc14d7004f29d88649ad885df8cca54a0d1c1cdf3e301ec32fc59c8f0c7cf66b9c8289fcd921f92bac157c3cc222f0e07d641a8cb889c005d854d44a92d12
-
SSDEEP
12288:giz2j8iJGRTwdfL6pvv0WC1R5LlLzrycVCBy0L/Y+M1eZ5qOP6bz8VoRHTpZI:ejRJTZ69pCf5xLzecVa/Y+lHhS3uup
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-