General
-
Target
doc02606820230327115145 Our Ref S3831841.tar.gz.exe
-
Size
960KB
-
Sample
230329-hy2y7sfb84
-
MD5
daf61c324b99483defa826425f5a3c6c
-
SHA1
5f95e47d72d57ca73edd7d884f21912ba0120830
-
SHA256
73aa9443a116f5f080fc98cba1e95378ae39d17b5de35e6f76df1482aca503f6
-
SHA512
9cbdb8d21b27f74b0b1c650ad7f505cd09c88c57fabe9db01ee96857543d66f6792f00f36e9c9938502b7fe6d29471ee74fd8d9e823097c44ad16526b9e0a5fc
-
SSDEEP
12288:SYcH/Ym8m40U1g6LfYdOKMhhLm733R3VoctIRy3+AhSsKySOVgA0klqUM5Z:SRgkwg6LfYdShiDtuUP3l75ShklqX
Static task
static1
Behavioral task
behavioral1
Sample
doc02606820230327115145 Our Ref S3831841.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
doc02606820230327115145 Our Ref S3831841.exe
Resource
win10v2004-20230221-en
Malware Config
Extracted
warzonerat
peggyboo.duckdns.org:4545
Targets
-
-
Target
doc02606820230327115145 Our Ref S3831841.exe
-
Size
958KB
-
MD5
8f9d3374b5f90a844d8d0b0f61492d4a
-
SHA1
c24902da8cda61f97fc37cc2c8786c4013731a37
-
SHA256
1f4d869399d9b218e7d9dd738129fdcff54c50c12f58a76772767fe272ce4c44
-
SHA512
2e1183792d31b45b55429739f05b70660120c6e9a5d795fa538fcd0cbaab1913fb47720d499977d58a64200127e18acb1ca824ed219636cd8bdede73b4cef3d4
-
SSDEEP
12288:CYcH/Ym8m40U1g6LfYdOKMhhLm733R3VoctIRy3+AhSsKySOVgA0klqUM5Zh:CRgkwg6LfYdShiDtuUP3l75ShklqXh
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
ModiLoader Second Stage
-
Warzone RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-