General
-
Target
WA000065987.exe
-
Size
478KB
-
Sample
230322-hjmwqshc31
-
MD5
c4ca6015924d96d2857a8a357e033063
-
SHA1
0c85bf5ea42896912005380fb036c558606fd07c
-
SHA256
6724ed0c8f434f238d2409c6ff5e03eccea511e0510d547da7b0672f85cac036
-
SHA512
4997cd549b4da280e4e39dc1b459a39c2e522fed9d9a84403682dccb408e58b6e844db98161d30650feffaa11674052437a4822282ddbd921f04d741620d55fe
-
SSDEEP
3072:4fY/TU9fE9PEtu8EbzNpL2gONwWlxfe1LJ38yk/FSxCfKIz8vlHnCqxuxWMifMU:uYa6TppaJ2WlxMOvoCyIzwhXcHiUU
Static task
static1
Behavioral task
behavioral1
Sample
WA000065987.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
WA000065987.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
warzonerat
172.245.251.219:2323
Targets
-
-
Target
WA000065987.exe
-
Size
478KB
-
MD5
c4ca6015924d96d2857a8a357e033063
-
SHA1
0c85bf5ea42896912005380fb036c558606fd07c
-
SHA256
6724ed0c8f434f238d2409c6ff5e03eccea511e0510d547da7b0672f85cac036
-
SHA512
4997cd549b4da280e4e39dc1b459a39c2e522fed9d9a84403682dccb408e58b6e844db98161d30650feffaa11674052437a4822282ddbd921f04d741620d55fe
-
SSDEEP
3072:4fY/TU9fE9PEtu8EbzNpL2gONwWlxfe1LJ38yk/FSxCfKIz8vlHnCqxuxWMifMU:uYa6TppaJ2WlxMOvoCyIzwhXcHiUU
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-