General
-
Target
order confirmation reference no. FXEPS6S100523 .exe
-
Size
804KB
-
Sample
230502-gbc6wshg52
-
MD5
abc22566e1c69dc36e74310dedf0ba9d
-
SHA1
e79b1e5426cb99f868722639b954388db77786ff
-
SHA256
f6e135f152463447adc3db1b0de4534d762e21699b17fea4fc66cd2dbf937345
-
SHA512
99d4d313a4c47603f56c62c9d5924adae04df8945feb6b7b6cccdf7076552c2903a5fce214d15cc354bcdd547c43a52fa373b4b3fbdba0703d52dbfdb69be770
-
SSDEEP
12288:0u+e4v0ma0dwwcQNHRh+ZXiwBdbPmWvy5dHnlllllllllllllllllllllllllll7:0uRQq0iwcmhEffeWKnzhxN2rn4P9h
Static task
static1
Behavioral task
behavioral1
Sample
order confirmation reference no. FXEPS6S100523 .exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
order confirmation reference no. FXEPS6S100523 .exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
warzonerat
nightmare4666.ddns.net:3443
Targets
-
-
Target
order confirmation reference no. FXEPS6S100523 .exe
-
Size
804KB
-
MD5
abc22566e1c69dc36e74310dedf0ba9d
-
SHA1
e79b1e5426cb99f868722639b954388db77786ff
-
SHA256
f6e135f152463447adc3db1b0de4534d762e21699b17fea4fc66cd2dbf937345
-
SHA512
99d4d313a4c47603f56c62c9d5924adae04df8945feb6b7b6cccdf7076552c2903a5fce214d15cc354bcdd547c43a52fa373b4b3fbdba0703d52dbfdb69be770
-
SSDEEP
12288:0u+e4v0ma0dwwcQNHRh+ZXiwBdbPmWvy5dHnlllllllllllllllllllllllllll7:0uRQq0iwcmhEffeWKnzhxN2rn4P9h
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
ModiLoader Second Stage
-
Warzone RAT payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-