General
-
Target
45503927f90fe4aeae2c91c6f13d3a647338f44565cc2ca26ba0c1d49968c9bf.exe
-
Size
3.8MB
-
Sample
240408-br6v9ace61
-
MD5
1b018d9d77edf9c08d39bc6080cf50d2
-
SHA1
b24d472f1cb43e0c114de888e9726a6cb8fafca3
-
SHA256
45503927f90fe4aeae2c91c6f13d3a647338f44565cc2ca26ba0c1d49968c9bf
-
SHA512
854a81e05309fe51efd17a49f00f2cd95a01a815923b27b055296b1e5ca8c5c718b2bbaabf0bdafce3019201c26c63ecc199a9210cacbf12d5d110b888f395f4
-
SSDEEP
98304:rwcCJEcjXKOFlOd/iZujgERMOarjSaoYI6gYo1je:rVaawOd/vMsMOaPI6To1je
Static task
static1
Behavioral task
behavioral1
Sample
45503927f90fe4aeae2c91c6f13d3a647338f44565cc2ca26ba0c1d49968c9bf.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
45503927f90fe4aeae2c91c6f13d3a647338f44565cc2ca26ba0c1d49968c9bf.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
xenorat
dgorijan20785.hopto.org
Xens_nd8918d
-
delay
5000
-
install_path
appdata
-
port
4488
-
startup_name
rar
Extracted
asyncrat
0.5.6A
dgorijan20785.hopto.org:6606
dgorijan20785.hopto.org:7707
dgorijan20785.hopto.org:8808
45.74.4.244:6606
45.74.4.244:7707
45.74.4.244:8808
v5tvc4rc3ex7
-
delay
5
-
install
false
-
install_folder
%AppData%
Extracted
darkcomet
2024+Apre2-new
dgorijan20785.hopto.org:35800
DC_MUTEX-3MW33TC
-
gencode
XE9EWd209YcQ
-
install
false
-
offline_keylogger
true
-
password
hhhhhh
-
persistence
false
Extracted
darkcomet
New-July-July4-02
dgorijan20785.hopto.org:35800
DC_MUTEX-JFYU2BC
-
gencode
UkVkDi2EZxxn
-
install
false
-
offline_keylogger
true
-
password
hhhhhh
-
persistence
false
Extracted
darkcomet
New-July-July4-0
45.74.4.244:35800
DC_MUTEX-RT27KF0
-
gencode
cKUHbX2GsGhs
-
install
false
-
offline_keylogger
true
-
password
hhhhhh
-
persistence
false
Extracted
warzonerat
45.74.4.244:5199
dgorijan20785.hopto.org:5199
Extracted
darkcomet
- gencode
-
install
false
-
offline_keylogger
false
-
persistence
false
Targets
-
-
Target
45503927f90fe4aeae2c91c6f13d3a647338f44565cc2ca26ba0c1d49968c9bf.exe
-
Size
3.8MB
-
MD5
1b018d9d77edf9c08d39bc6080cf50d2
-
SHA1
b24d472f1cb43e0c114de888e9726a6cb8fafca3
-
SHA256
45503927f90fe4aeae2c91c6f13d3a647338f44565cc2ca26ba0c1d49968c9bf
-
SHA512
854a81e05309fe51efd17a49f00f2cd95a01a815923b27b055296b1e5ca8c5c718b2bbaabf0bdafce3019201c26c63ecc199a9210cacbf12d5d110b888f395f4
-
SSDEEP
98304:rwcCJEcjXKOFlOd/iZujgERMOarjSaoYI6gYo1je:rVaawOd/vMsMOaPI6To1je
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Async RAT payload
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Detects executables containing SQL queries to confidential data stores. Observed in infostealers
-
Detects executables embedding command execution via IExecuteCommand COM object
-
Detects file containing reversed ASEP Autorun registry keys
-
UPX dump on OEP (original entry point)
-
Warzone RAT payload
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-