General
-
Target
NEW ORDER.ace
-
Size
26KB
-
Sample
230511-vp9c5sba5s
-
MD5
327a28b816e000b16c567eb7df943fe5
-
SHA1
065745ae91b5263813b4766d5906e1a687a1a0a1
-
SHA256
a7400fc6a15efb3ba5d663c47258ad3b79696ca39eedf8d29e5d4686518bc740
-
SHA512
5eab71eaf880cdf7ca8d2ede073eab55827d737b0b6db8f95fd49d9f1b5d4908f980c64334554101641b35e28f6efbaa4e4e5ed52ae30383c2ed97af1215438f
-
SSDEEP
768:nuBLR9ys/OqZVbklWiXS4v8Rljh6Xz9nkRTcza:uBL3Z7ZRklWiC44LKlkhn
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
NEW ORDER.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
warzonerat
51.75.209.245:5252
Targets
-
-
Target
NEW ORDER.exe
-
Size
64KB
-
MD5
35c834fc25778529bde95c02a5305d84
-
SHA1
50dc363ea605f63ea2e11518c82d199e588dd2bd
-
SHA256
2db1ee71637f8e3431085b022e05551e621d8ca97215495a1304e016f4ceb74d
-
SHA512
d64e0107d03ed8f478d65a8e531982faf49d741bf23c6abe8c3f8699693a4cf81cf633afe28bd44bf263b9a9a6b04a282b206d7ce7aca121f1a3b9cb33c73f59
-
SSDEEP
1536:fra2PYE8+se630VDcM7TPxdF8o75F943hh:fra2gE8+SEVDcMfxvXX4
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Sets DLL path for service in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-