General

  • Target

    6f00f39f32bb3556f024b6e877337a8e6ba5a2feda5d1187e85684de23471ff7.exe

  • Size

    141KB

  • MD5

    f162051a9bbf0654b6e528b601b048b5

  • SHA1

    19af80d9fb075026bacc9a56aae68d84b36cc123

  • SHA256

    6f00f39f32bb3556f024b6e877337a8e6ba5a2feda5d1187e85684de23471ff7

  • SHA512

    b75fcc6dd1e38bf4810565a055448ae97c882addb19bd272ef1f9a0171588bfdd56459da391968e724af98457905a09a0aa85776eb6d129129fc39355f93df60

  • SSDEEP

    3072:2k4aHUBOO36YplMqBB3ZcPxlG+bBsDHqYzHKG0qIwjw:2dx3wqz3ZcDeDKYzqG01wjw

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

wrzn.duckdns.org:45560

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Detects executables embedding command execution via IExecuteCommand COM object 1 IoCs
  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 6f00f39f32bb3556f024b6e877337a8e6ba5a2feda5d1187e85684de23471ff7.exe
    .exe windows:6 windows x86 arch:x86

    0145d2c473bdbcd7b46a054bd6893ec4


    Headers

    Imports

    Sections