General
-
Target
bd052b6fcba494c12b9a953f2281516baf663f1dd89568c762bc089faf466913
-
Size
4.2MB
-
Sample
240814-ksrx6ayaln
-
MD5
d55ecd80d2ec6fa9e2dcf1965fbac00e
-
SHA1
f9729d435ba0b1025c8bbec8557f96ccb4c01a61
-
SHA256
bd052b6fcba494c12b9a953f2281516baf663f1dd89568c762bc089faf466913
-
SHA512
8ffe77f51471c2073d57b48d3ce29507bc6542dd1b357cbc17e0836bc5e47a60095647e059700e4c46e03dc59fea54962574253af961ad34e512ee090b767b92
-
SSDEEP
98304:r0HyeSxnMFSjcFx2eR/8n5aX6EK7SZ0lW9mNOLfIAx:4SegnfMgCuc/YSJ9mNOLgAx
Static task
static1
Behavioral task
behavioral1
Sample
INV-20230822.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
INV-20230822.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
warzonerat
victorybelng.ddns.net:13900
Targets
-
-
Target
INV-20230822.cmd
-
Size
4.7MB
-
MD5
073eda398bb992c245ea72ba948282af
-
SHA1
60b8af064e8beae96829cc62fad8a0f34e745145
-
SHA256
c37739fd8d58467e960f81f0f5260b45ec23d4c772d3e3cbb0c3d42089fdf6ee
-
SHA512
a75001cd01d9a1260bf01d9320df596e490a6fd8ad9ca2921bdb67464422613ca94425dcd1f1db673acf9e471b1a1ed4cb6856acb99dd3fd2383c2c4131c4449
-
SSDEEP
98304:4v8upB6APFAYS8ILk65Hxp44MVghKrVy+dr5/FtqvG:O8upg+GYCkf4qg4h/FQvG
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-