General
-
Target
ORDER883274777724884pdf.vbs
-
Size
19KB
-
Sample
240806-gm4szsvfqh
-
MD5
7e2ef2525a8c587529e9b0dae21f3709
-
SHA1
75e91eb1ecefa8ffa43b766ce5ef36df88c1887c
-
SHA256
d7190b79fb6e5d8687b4189bd2fbebb275530fb80f89569770a4d6cec5e0061e
-
SHA512
93b6dac71d4a59bdfc03b8c4ecc8795de1b8844c29cd5fcc4ee1f843df18cf60a7c62fd5a7d9c71c4fa9979e0e4768a6b6bf8abc1168aaccbdf187dd71075071
-
SSDEEP
384:HhnrLUNd/atj/K3wSGkPJmxNSiMFpWrd2Wx3l4cgb1:HhnfrtjS3dGwW2wzxl4Pp
Static task
static1
Behavioral task
behavioral1
Sample
ORDER883274777724884pdf.vbs
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ORDER883274777724884pdf.vbs
Resource
win10v2004-20240802-en
Malware Config
Extracted
warzonerat
mad.pzg-peru.com:77
Targets
-
-
Target
ORDER883274777724884pdf.vbs
-
Size
19KB
-
MD5
7e2ef2525a8c587529e9b0dae21f3709
-
SHA1
75e91eb1ecefa8ffa43b766ce5ef36df88c1887c
-
SHA256
d7190b79fb6e5d8687b4189bd2fbebb275530fb80f89569770a4d6cec5e0061e
-
SHA512
93b6dac71d4a59bdfc03b8c4ecc8795de1b8844c29cd5fcc4ee1f843df18cf60a7c62fd5a7d9c71c4fa9979e0e4768a6b6bf8abc1168aaccbdf187dd71075071
-
SSDEEP
384:HhnrLUNd/atj/K3wSGkPJmxNSiMFpWrd2Wx3l4cgb1:HhnfrtjS3dGwW2wzxl4Pp
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Warzone RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-