General
-
Target
rUienrbalkhdy.exe
-
Size
31KB
-
Sample
231220-alhe2abder
-
MD5
fab2eba0f5683ce922b6c2f9e5181e23
-
SHA1
02262d9147e7930eb50c687ede1ffd0cb5d68892
-
SHA256
daf0f1674f1796eec5b3a386424ab8e8818513f45c6e7257a2ab163c7c95087c
-
SHA512
e9c68fe5435eb9101c1afe9f8e2ae1a20774178eae0ef59ed986a5fc8750d9eef7621783b6200ba3d914baca86298db4151d8202c2561d77ba2d2d61031384c1
-
SSDEEP
768:F2dwnmxKPky5Oe58zwWXMdA5Vcnn9z1X:BdvadXMy5GnnN1X
Static task
static1
Behavioral task
behavioral1
Sample
rUienrbalkhdy.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
rUienrbalkhdy.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
warzonerat
109.248.151.69:42255
Targets
-
-
Target
rUienrbalkhdy.exe
-
Size
31KB
-
MD5
fab2eba0f5683ce922b6c2f9e5181e23
-
SHA1
02262d9147e7930eb50c687ede1ffd0cb5d68892
-
SHA256
daf0f1674f1796eec5b3a386424ab8e8818513f45c6e7257a2ab163c7c95087c
-
SHA512
e9c68fe5435eb9101c1afe9f8e2ae1a20774178eae0ef59ed986a5fc8750d9eef7621783b6200ba3d914baca86298db4151d8202c2561d77ba2d2d61031384c1
-
SSDEEP
768:F2dwnmxKPky5Oe58zwWXMdA5Vcnn9z1X:BdvadXMy5GnnN1X
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-