General
-
Target
242e99979a3db8b0f4e1dfeb5259d490.bin
-
Size
497KB
-
Sample
230401-bgyrwseh66
-
MD5
d4e731bf2b38c0d5cc53096eced852fb
-
SHA1
27a6a96d4fdac02b321a1964270cae7d3f177fdc
-
SHA256
f7eadefaec90e8e2faaab3e770f3b65f186459a467176c740fb83aff665c62ab
-
SHA512
91e61d79bc5e78dd0e9133e31784069d08b67153a9d71796e44ce4334700e8942b66ccfc5d3236a10c3899736774601e3732f70029b66ad477c477eb12cbac67
-
SSDEEP
12288:mnq1urS1c3s/zn/d2u0KqZb/nOszPtpLZqWlV/RFEgAb:mp36z/dnq9OszHNRz/Rf2
Static task
static1
Behavioral task
behavioral1
Sample
bbe2edc7400d0104700d9e98c69a46932cad47779283209a4fa3b035d46daf09.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bbe2edc7400d0104700d9e98c69a46932cad47779283209a4fa3b035d46daf09.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
warzonerat
panchak.duckdns.org:5050
Targets
-
-
Target
bbe2edc7400d0104700d9e98c69a46932cad47779283209a4fa3b035d46daf09.exe
-
Size
623KB
-
MD5
242e99979a3db8b0f4e1dfeb5259d490
-
SHA1
e221b9efdb05e767878a43232a0bea02c1e573dc
-
SHA256
bbe2edc7400d0104700d9e98c69a46932cad47779283209a4fa3b035d46daf09
-
SHA512
03b8aceac2aa0330c8217d5a0248c145bb9efd12c825b73672a2a2b4d7292f27d6bfc3fb36a929a4c4811fe1a3e90db5c76888677a73753473c185137cd87e57
-
SSDEEP
12288:leJ/sIuNNh6jszPXHF8wLqEnU5l/CBnTsUxI8/qMOqS4simOMt+W:1QjsrXHF7bICBnjl/simX
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-