General
-
Target
mb_mw.exe
-
Size
408KB
-
Sample
230327-jpm95acd39
-
MD5
f9e2cba1859363981faf603e31397d16
-
SHA1
b12b61363d3150388ac554f0bc46d00106c9dfa6
-
SHA256
bad970e9402f9d346e7c58c42253bcedd6fb6ccda7115194ba9538153628778e
-
SHA512
60459a9d38a576d85198de144a8aa683acd06a8f8a94e44350cf5262d31a57262281fd9bd3a525a061c3cbd3331b30629357da164a49149df09e33bc5e0e3831
-
SSDEEP
6144:j0mi4eWGUSUm5FGNMgXDE6PXDsBRHJeqfqdNfN7nIhM1XDsBRHJeq:op4eWGRPgCADtzwHJev7hIhM1zwHJe
Static task
static1
Behavioral task
behavioral1
Sample
mb_mw.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
mb_mw.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
warzonerat
46.183.222.62:5353
Targets
-
-
Target
mb_mw.exe
-
Size
408KB
-
MD5
f9e2cba1859363981faf603e31397d16
-
SHA1
b12b61363d3150388ac554f0bc46d00106c9dfa6
-
SHA256
bad970e9402f9d346e7c58c42253bcedd6fb6ccda7115194ba9538153628778e
-
SHA512
60459a9d38a576d85198de144a8aa683acd06a8f8a94e44350cf5262d31a57262281fd9bd3a525a061c3cbd3331b30629357da164a49149df09e33bc5e0e3831
-
SSDEEP
6144:j0mi4eWGUSUm5FGNMgXDE6PXDsBRHJeqfqdNfN7nIhM1XDsBRHJeq:op4eWGRPgCADtzwHJev7hIhM1zwHJe
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-