Malware Analysis Report

2024-10-24 16:46

Sample ID 240417-q5m3maae23
Target 1b79a09db2caae0fa2b7e07dd43075ce7f7c8ea64bbd5595653c7ee3741d1678
SHA256 1b79a09db2caae0fa2b7e07dd43075ce7f7c8ea64bbd5595653c7ee3741d1678
Tags
warzonerat infostealer rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1b79a09db2caae0fa2b7e07dd43075ce7f7c8ea64bbd5595653c7ee3741d1678

Threat Level: Known bad

The file 1b79a09db2caae0fa2b7e07dd43075ce7f7c8ea64bbd5595653c7ee3741d1678 was found to be: Known bad.

Malicious Activity Summary

warzonerat infostealer rat

WarzoneRat, AveMaria

Warzone RAT payload

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-17 13:50

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-17 13:50

Reported

2024-04-17 13:53

Platform

win7-20240220-en

Max time kernel

150s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\61a8d6678098ddfa8d1b418cc5d851823d6b09bd5bb4fcf68f0f0797abe61873.exe"

Signatures

WarzoneRat, AveMaria

rat infostealer warzonerat

Warzone RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\61a8d6678098ddfa8d1b418cc5d851823d6b09bd5bb4fcf68f0f0797abe61873.exe

"C:\Users\Admin\AppData\Local\Temp\61a8d6678098ddfa8d1b418cc5d851823d6b09bd5bb4fcf68f0f0797abe61873.exe"

Network

Country Destination Domain Proto
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp

Files

memory/2308-1-0x0000000000630000-0x0000000000730000-memory.dmp

memory/2308-2-0x0000000000220000-0x0000000000242000-memory.dmp

memory/2308-3-0x0000000000400000-0x000000000055A000-memory.dmp

memory/2308-4-0x0000000000400000-0x000000000055A000-memory.dmp

memory/2308-6-0x0000000000630000-0x0000000000730000-memory.dmp

memory/2308-7-0x0000000000220000-0x0000000000242000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-17 13:50

Reported

2024-04-17 13:53

Platform

win10v2004-20240412-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\61a8d6678098ddfa8d1b418cc5d851823d6b09bd5bb4fcf68f0f0797abe61873.exe"

Signatures

WarzoneRat, AveMaria

rat infostealer warzonerat

Warzone RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\61a8d6678098ddfa8d1b418cc5d851823d6b09bd5bb4fcf68f0f0797abe61873.exe

"C:\Users\Admin\AppData\Local\Temp\61a8d6678098ddfa8d1b418cc5d851823d6b09bd5bb4fcf68f0f0797abe61873.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 216.250.253.35:2356 tcp
US 8.8.8.8:53 138.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 216.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 216.250.253.35:2356 tcp
US 8.8.8.8:53 132.250.30.184.in-addr.arpa udp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 9.139.73.23.in-addr.arpa udp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 138.136.73.23.in-addr.arpa udp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
US 216.250.253.35:2356 tcp
SE 192.229.221.95:80 tcp

Files

memory/892-1-0x00000000007E0000-0x00000000008E0000-memory.dmp

memory/892-2-0x00000000021B0000-0x00000000021D2000-memory.dmp

memory/892-3-0x0000000000400000-0x000000000055A000-memory.dmp

memory/892-4-0x0000000000400000-0x000000000055A000-memory.dmp

memory/892-6-0x00000000007E0000-0x00000000008E0000-memory.dmp

memory/892-7-0x00000000021B0000-0x00000000021D2000-memory.dmp