General
-
Target
Re Porforma Invoice 60 downpayment - PT Era F1909003 Project Kupang.exe
-
Size
718KB
-
Sample
230502-p8epzsbb47
-
MD5
eae3bd76ec42b738462cb746206550bc
-
SHA1
8f071fc96b3f464cd1fa1c63624c4e62270e22dc
-
SHA256
969af9f6016a316693a0d710460a4b6576185a2907c999985f2642ef26889584
-
SHA512
990a88710a4484bcc6b0c121a2089de282298d6f7bee46d2676a19658bc9ce1d5fd2fee3112aa7db2553ed39ddc80d1a28800665a2270462ea2316666d28c65f
-
SSDEEP
12288:v5l9W77bOltPah+3EwFE4303gWWAAT6JlK0Xh:vHcOAIy2T6FXh
Static task
static1
Behavioral task
behavioral1
Sample
Re Porforma Invoice 60 downpayment - PT Era F1909003 Project Kupang.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Re Porforma Invoice 60 downpayment - PT Era F1909003 Project Kupang.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
warzonerat
nightmare4666.ddns.net:3443
Targets
-
-
Target
Re Porforma Invoice 60 downpayment - PT Era F1909003 Project Kupang.exe
-
Size
718KB
-
MD5
eae3bd76ec42b738462cb746206550bc
-
SHA1
8f071fc96b3f464cd1fa1c63624c4e62270e22dc
-
SHA256
969af9f6016a316693a0d710460a4b6576185a2907c999985f2642ef26889584
-
SHA512
990a88710a4484bcc6b0c121a2089de282298d6f7bee46d2676a19658bc9ce1d5fd2fee3112aa7db2553ed39ddc80d1a28800665a2270462ea2316666d28c65f
-
SSDEEP
12288:v5l9W77bOltPah+3EwFE4303gWWAAT6JlK0Xh:vHcOAIy2T6FXh
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
ModiLoader Second Stage
-
Warzone RAT payload
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-