General
-
Target
PrivateKey_15GECExQTVNM4XCVD8VsTbMFYFcfXh2wk8.rar
-
Size
1.9MB
-
Sample
240221-ygpwbaed6y
-
MD5
b2fcd40069f2702a08154dbe8777e776
-
SHA1
0545f0252ddb52ae05af94e43faeac6798c098ec
-
SHA256
1a2d91d4583245bfd63a9b9da90337ba7d4527482c59e26225403500a5cd5379
-
SHA512
e83ed660eebe06cf290bb68c6247aec4d34f1c1779d6581806b42e7211749cf82fc25fa53c767fcfb672030f3d696bcdc5ab61f86ee95a031050bee8a26fe266
-
SSDEEP
49152:7L2lgzRXqTq4Du+71fgDdsuUWNLhj1QTWC9b+ZS:nJlXqpDZRYDyuUSLPMWr8
Static task
static1
Behavioral task
behavioral1
Sample
PrivateKey_15GECExQTVNM4XCVD8VsTbMFYFcfXh2wk8/PrivateKey_15GECExQTVNM4XCVD8VsTbMFYFcfXh2wk8.scr
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
PrivateKey_15GECExQTVNM4XCVD8VsTbMFYFcfXh2wk8/PrivateKey_15GECExQTVNM4XCVD8VsTbMFYFcfXh2wk8.scr
Resource
win10v2004-20240221-en
Malware Config
Extracted
darkcomet
New-July-July4-02
dgorijan20785.hopto.org:35800
DC_MUTEX-JFYU2BC
-
gencode
UkVkDi2EZxxn
-
install
false
-
offline_keylogger
true
-
password
hhhhhh
-
persistence
false
Extracted
darkcomet
New-July-July4-0
45.74.4.244:35800
DC_MUTEX-RT27KF0
-
gencode
cKUHbX2GsGhs
-
install
false
-
offline_keylogger
true
-
password
hhhhhh
-
persistence
false
Extracted
warzonerat
dgorijan20785.hopto.org:5199
45.74.4.244:5199
Extracted
asyncrat
0.5.6A
null
45.74.4.244:6606
45.74.4.244:7707
45.74.4.244:8808
servtle284
-
delay
5
-
install
true
-
install_file
wintskl.exe
-
install_folder
%AppData%
Extracted
babylonrat
dgorijan20785.hopto.org
Targets
-
-
Target
PrivateKey_15GECExQTVNM4XCVD8VsTbMFYFcfXh2wk8/PrivateKey_15GECExQTVNM4XCVD8VsTbMFYFcfXh2wk8.scr
-
Size
2.0MB
-
MD5
9e24897df35b09b2b67823b1e47a5b24
-
SHA1
f878bad995d4188f1de75263724f5935fc6a2408
-
SHA256
6b0fe8528ae159c1c6dbe6275f1e89d1aabafe842cb4ec01df7eb0d47d0a0358
-
SHA512
1f0b56b1c0166f3a8cf15e231c7a62bb3e3d38e355c37ea3a1a4d02b339564f81559203371eb04ca725e7b1b95b999be29938166570edd4c288eb7ab1c6341e6
-
SSDEEP
49152:moUM9eEZyfky3a7B9L787fYIdLVYZcl+:bUMHyR3sB9q7CKA
-
Asyncrat family
-
Babylonrat family
-
Darkcomet family
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1