General
-
Target
INQUIRY 20230330.exe
-
Size
623KB
-
Sample
230330-x6p2yafd61
-
MD5
242e99979a3db8b0f4e1dfeb5259d490
-
SHA1
e221b9efdb05e767878a43232a0bea02c1e573dc
-
SHA256
bbe2edc7400d0104700d9e98c69a46932cad47779283209a4fa3b035d46daf09
-
SHA512
03b8aceac2aa0330c8217d5a0248c145bb9efd12c825b73672a2a2b4d7292f27d6bfc3fb36a929a4c4811fe1a3e90db5c76888677a73753473c185137cd87e57
-
SSDEEP
12288:leJ/sIuNNh6jszPXHF8wLqEnU5l/CBnTsUxI8/qMOqS4simOMt+W:1QjsrXHF7bICBnjl/simX
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY 20230330.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
INQUIRY 20230330.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
warzonerat
panchak.duckdns.org:5050
Targets
-
-
Target
INQUIRY 20230330.exe
-
Size
623KB
-
MD5
242e99979a3db8b0f4e1dfeb5259d490
-
SHA1
e221b9efdb05e767878a43232a0bea02c1e573dc
-
SHA256
bbe2edc7400d0104700d9e98c69a46932cad47779283209a4fa3b035d46daf09
-
SHA512
03b8aceac2aa0330c8217d5a0248c145bb9efd12c825b73672a2a2b4d7292f27d6bfc3fb36a929a4c4811fe1a3e90db5c76888677a73753473c185137cd87e57
-
SSDEEP
12288:leJ/sIuNNh6jszPXHF8wLqEnU5l/CBnTsUxI8/qMOqS4simOMt+W:1QjsrXHF7bICBnjl/simX
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-