General
-
Target
8171176384ec801f2612bcd4a4198dd0N.exe
-
Size
1.4MB
-
Sample
240806-ka6nlaybnd
-
MD5
8171176384ec801f2612bcd4a4198dd0
-
SHA1
64dd954c6ebc58c7ed636290f751c7055cd3fd36
-
SHA256
c5facef66d2e82fd46d67760a6f7f0be8fd45c42335bf34c0bce5eb32046c4b0
-
SHA512
0750c449c15177f9f712ba11ac6e3b60c1e1c8a528adc1e389d50d9328735785096ae9645d338da61e58368aa33e586c688f2e48bdf4698fa9e3744fcc3bdb0c
-
SSDEEP
24576:ru6J3xO0c+JY5UZ+XCHkGso6Fa720W4njUprvVcC1f2o5RRfgdWYG:Fo0c++OCokGs9Fa+rd1f26RNYG
Behavioral task
behavioral1
Sample
8171176384ec801f2612bcd4a4198dd0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8171176384ec801f2612bcd4a4198dd0N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Targets
-
-
Target
8171176384ec801f2612bcd4a4198dd0N.exe
-
Size
1.4MB
-
MD5
8171176384ec801f2612bcd4a4198dd0
-
SHA1
64dd954c6ebc58c7ed636290f751c7055cd3fd36
-
SHA256
c5facef66d2e82fd46d67760a6f7f0be8fd45c42335bf34c0bce5eb32046c4b0
-
SHA512
0750c449c15177f9f712ba11ac6e3b60c1e1c8a528adc1e389d50d9328735785096ae9645d338da61e58368aa33e586c688f2e48bdf4698fa9e3744fcc3bdb0c
-
SSDEEP
24576:ru6J3xO0c+JY5UZ+XCHkGso6Fa720W4njUprvVcC1f2o5RRfgdWYG:Fo0c++OCokGs9Fa+rd1f26RNYG
-
NetWire RAT payload
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-