General
-
Target
Order specification details & P.O.exe
-
Size
293KB
-
Sample
231005-bxec7aga31
-
MD5
ff347cfc7f5bc51e626366aa9099e2d1
-
SHA1
6f4e07dd2aa8abd8d4ff4856cb7f3d1dc3549740
-
SHA256
4732c2a4e78e5f416cf1d7abf28c1991e45ac8706fbab576b84f0b72d0288d2f
-
SHA512
93c808d41b9863055244e42b0ab45311129d74cb94f931ff80ab0db023fab8728e261e042587c8ab4ae41fb088f11f6d5023e2dd2eda14e2008ce7ba24d25f17
-
SSDEEP
6144:InPdudwD/cmeeEYgXrCxF+OUC2oODwgqazL8sMb2jBV+R4N0W+TO:InPdTb7EYKa+OUC2oODw0zLgbgeR1/O
Static task
static1
Behavioral task
behavioral1
Sample
Order specification details & P.O.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Order specification details & P.O.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
warzonerat
64.188.20.119:5200
Targets
-
-
Target
Order specification details & P.O.exe
-
Size
293KB
-
MD5
ff347cfc7f5bc51e626366aa9099e2d1
-
SHA1
6f4e07dd2aa8abd8d4ff4856cb7f3d1dc3549740
-
SHA256
4732c2a4e78e5f416cf1d7abf28c1991e45ac8706fbab576b84f0b72d0288d2f
-
SHA512
93c808d41b9863055244e42b0ab45311129d74cb94f931ff80ab0db023fab8728e261e042587c8ab4ae41fb088f11f6d5023e2dd2eda14e2008ce7ba24d25f17
-
SSDEEP
6144:InPdudwD/cmeeEYgXrCxF+OUC2oODwgqazL8sMb2jBV+R4N0W+TO:InPdTb7EYKa+OUC2oODw0zLgbgeR1/O
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-