General
-
Target
4674e41064471788442b3b712c152414
-
Size
698KB
-
Sample
240106-rq95aabee4
-
MD5
4674e41064471788442b3b712c152414
-
SHA1
dbcf1543238fb33bd4ef817cda8148a8e2118375
-
SHA256
542c835beecdb583d91729b609d49a1e9e6072dce2148701faaa356723d241be
-
SHA512
84132c2ff04e50f04993d0ceb6ed2618b80d22cf5fc5e5bf4d6dcbe6fd3d5ead30dba2951c0df9dab392b1c96c1463114fe9bb98fd13e1bc4009ac6f5ab1ed5d
-
SSDEEP
12288:zkIUeiG2E73BzHjyOyHpBvygTUxieU66yI8ku/z0xast:lypBvygA8eU66yfgEst
Static task
static1
Behavioral task
behavioral1
Sample
4674e41064471788442b3b712c152414.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4674e41064471788442b3b712c152414.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
limerat
1NCY4zKfbzBA6apXnRcp4SEPaZc1xeYtzi
-
aes_key
NYANCAT
-
antivm
false
-
c2_url
https://pastebin.com/raw/LJe9sUk5
-
delay
6
-
download_payload
false
-
install
false
-
install_name
Wservices.exe
-
main_folder
Temp
-
pin_spread
false
-
sub_folder
\
-
usb_spread
true
Extracted
warzonerat
businessdministration.webredirect.org:5292
Extracted
njrat
0.7.3
OfficeH
virtuallogoprepaidmax.duckdns.org:6527
Client.exe
-
reg_key
Client.exe
-
splitter
1904
Targets
-
-
Target
4674e41064471788442b3b712c152414
-
Size
698KB
-
MD5
4674e41064471788442b3b712c152414
-
SHA1
dbcf1543238fb33bd4ef817cda8148a8e2118375
-
SHA256
542c835beecdb583d91729b609d49a1e9e6072dce2148701faaa356723d241be
-
SHA512
84132c2ff04e50f04993d0ceb6ed2618b80d22cf5fc5e5bf4d6dcbe6fd3d5ead30dba2951c0df9dab392b1c96c1463114fe9bb98fd13e1bc4009ac6f5ab1ed5d
-
SSDEEP
12288:zkIUeiG2E73BzHjyOyHpBvygTUxieU66yI8ku/z0xast:lypBvygA8eU66yfgEst
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Legitimate hosting services abused for malware hosting/C2
-