General

  • Target

    f9ce9a047b096cb954193ac49049ccb28a476aa8c202f09aea38eae3cb283387.exe

  • Size

    132KB

  • MD5

    7986acff81fdbe475364a07ff01ad325

  • SHA1

    a8e143bdfef92587d38594ad8adf597c3ec1d3de

  • SHA256

    f9ce9a047b096cb954193ac49049ccb28a476aa8c202f09aea38eae3cb283387

  • SHA512

    8ab9d8910d188a694d467a09a274c76d5b98f9e1b9dba4e763ebd06b2515490841c2784be7dc2c0e65c5a6b125f008805eba4861c0b65472aeb6bfc9a1c19c86

  • SSDEEP

    3072:K7W9jps0Tx4azG6GweOTir5axbjNCz45LT7a:KwpsERzGKurEXCzeLT7a

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

185.241.208.23:5200

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Detects executables embedding command execution via IExecuteCommand COM object 1 IoCs
  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • f9ce9a047b096cb954193ac49049ccb28a476aa8c202f09aea38eae3cb283387.exe
    .exe windows:6 windows x86 arch:x86

    56fc94e02d7bc310030753938e49a91a


    Headers

    Imports

    Sections