General

  • Target

    ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03

  • Size

    141KB

  • MD5

    69f1b1837eec6d3b743e067eb8590959

  • SHA1

    886ada51656010297deb513aa0ec73ecbb4e5a31

  • SHA256

    ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03

  • SHA512

    7c5a7bf11960fdf9ddcbdd2a9371f0ac163d3e273be1358b6de608893655c3412d3c26a5db3c93116e693aa679a24fc28fd234cedeaf425a448cbd0ed55a1757

  • SSDEEP

    3072:RARHROub6IiZktM+t4B6IZeAzaZyJ6QYzHHxgGT0Iw:RkxbQktMo4BRiyjYz6GTrw

Score
10/10

Malware Config

Extracted

Family

warzonerat

C2

94.131.110.60:5200

Signatures

  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Detects executables embedding command execution via IExecuteCommand COM object 1 IoCs
  • Warzone RAT payload 1 IoCs
  • Warzonerat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • ed63cc891f28d284baf85525ce5e833c541429a1d09e999ac4d08ca4080e7f03
    .exe windows:6 windows x86 arch:x86

    570db8ef63a92b7fa4b4955d1d36a178


    Headers

    Imports

    Sections