General
-
Target
PO100223-JORDANARMOTIVE-REQUEST FOR QUOTE.doc
-
Size
3KB
-
Sample
231002-t6ysasee76
-
MD5
a987537f359de9010905273f3d1bac6a
-
SHA1
6dcc57cd338b5e3ebe59dbb8b5167ad9a4e21b7e
-
SHA256
3077eb11b2b577d6d22fe5efaa8728192132a62a821dfe81af9f5626091c84b9
-
SHA512
8e58e054234b4cf722037c00b5bed9e9aaac296481fc20849eccf075c41668575579ad1fdd41e623d04f31e34a612caffc9f98abaa9ed37082151b303f09d39e
Static task
static1
Behavioral task
behavioral1
Sample
PO100223-JORDANARMOTIVE-REQUEST FOR QUOTE.rtf
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
PO100223-JORDANARMOTIVE-REQUEST FOR QUOTE.rtf
Resource
win10v2004-20230915-en
Malware Config
Extracted
warzonerat
osiarus.duckdns.org:4244
Targets
-
-
Target
PO100223-JORDANARMOTIVE-REQUEST FOR QUOTE.doc
-
Size
3KB
-
MD5
a987537f359de9010905273f3d1bac6a
-
SHA1
6dcc57cd338b5e3ebe59dbb8b5167ad9a4e21b7e
-
SHA256
3077eb11b2b577d6d22fe5efaa8728192132a62a821dfe81af9f5626091c84b9
-
SHA512
8e58e054234b4cf722037c00b5bed9e9aaac296481fc20849eccf075c41668575579ad1fdd41e623d04f31e34a612caffc9f98abaa9ed37082151b303f09d39e
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-