General
-
Target
ORDER-238175F.pdf.js
-
Size
7KB
-
Sample
230817-wt8svabg75
-
MD5
71223537f79596646a8938dd2346b649
-
SHA1
e0746a857f5aa62fff78070bd3b97db2ddfe559a
-
SHA256
7a57c3bcbdfc2482505bcf4c20885c1288635f780667a5cf4c7f0804251dd719
-
SHA512
a6850d1eed527874e8b93aa29fa76df11faa7147392db4bb8acf255f4cef028ebfddec329c8f8d0c2e3010f0f0b05b650558108583ae28a0913a849c6dff33ab
-
SSDEEP
192:RrhdeJCAgeSP5NvpaQKz6epeZeyqOeLDe2t5De2OeLDeTeaeIC:dvpBiRjj
Static task
static1
Behavioral task
behavioral1
Sample
ORDER-238175F.pdf.js
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ORDER-238175F.pdf.js
Resource
win10v2004-20230703-en
Malware Config
Extracted
warzonerat
chongmei33.publicvm.com:49746
Extracted
wshrat
http://chongmei33.publicvm.com:7045
Targets
-
-
Target
ORDER-238175F.pdf.js
-
Size
7KB
-
MD5
71223537f79596646a8938dd2346b649
-
SHA1
e0746a857f5aa62fff78070bd3b97db2ddfe559a
-
SHA256
7a57c3bcbdfc2482505bcf4c20885c1288635f780667a5cf4c7f0804251dd719
-
SHA512
a6850d1eed527874e8b93aa29fa76df11faa7147392db4bb8acf255f4cef028ebfddec329c8f8d0c2e3010f0f0b05b650558108583ae28a0913a849c6dff33ab
-
SSDEEP
192:RrhdeJCAgeSP5NvpaQKz6epeZeyqOeLDe2t5De2OeLDeTeaeIC:dvpBiRjj
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-