General
-
Target
9f772e3b6f92a0f25a040c1fc12899847dfce0a8b0a331be87be264b536c446b.exe
-
Size
5.7MB
-
Sample
240829-vh38jstflj
-
MD5
5a2964a93da5e8a9726ab479814f012d
-
SHA1
bb2599555ca21395946f4d0d828f6c78394d18c2
-
SHA256
9f772e3b6f92a0f25a040c1fc12899847dfce0a8b0a331be87be264b536c446b
-
SHA512
889e00f04115e71e763381bee25eee66e37cc304e874c1bcbc1aa23f63ee40299e81c760296cf78b3a8159ee5327a10434759ad099a61c0496e0b0d4d3beef08
-
SSDEEP
98304:pv8upB6APFAYS8ILk65Hxp44MVghKrVy+dr5/FtqvGo4T:18upg+GYCkf4qg4h/FQvGo
Static task
static1
Behavioral task
behavioral1
Sample
9f772e3b6f92a0f25a040c1fc12899847dfce0a8b0a331be87be264b536c446b.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9f772e3b6f92a0f25a040c1fc12899847dfce0a8b0a331be87be264b536c446b.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
warzonerat
victorybelng.ddns.net:13900
Targets
-
-
Target
9f772e3b6f92a0f25a040c1fc12899847dfce0a8b0a331be87be264b536c446b.exe
-
Size
5.7MB
-
MD5
5a2964a93da5e8a9726ab479814f012d
-
SHA1
bb2599555ca21395946f4d0d828f6c78394d18c2
-
SHA256
9f772e3b6f92a0f25a040c1fc12899847dfce0a8b0a331be87be264b536c446b
-
SHA512
889e00f04115e71e763381bee25eee66e37cc304e874c1bcbc1aa23f63ee40299e81c760296cf78b3a8159ee5327a10434759ad099a61c0496e0b0d4d3beef08
-
SSDEEP
98304:pv8upB6APFAYS8ILk65Hxp44MVghKrVy+dr5/FtqvGo4T:18upg+GYCkf4qg4h/FQvGo
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-