General
-
Target
d4f508a5c681d315b9aa0c19dcd2803b_JaffaCakes118
-
Size
277KB
-
Sample
240908-wzas1asfmh
-
MD5
d4f508a5c681d315b9aa0c19dcd2803b
-
SHA1
7bdd5b60ae9f4d0a3b612bfe06e2f835c4ef74a2
-
SHA256
2e9e628e383027ea678969f71b34bc212590e5f829fd55fd824cf9fab0014fe7
-
SHA512
09dd265ca3f64affefd072344d2360e99ed48b9c6ef6fc009e4c5597e0181d4a12b220471a27ed9af1713b33b8aa74714ad75588b744ae5f5613dfc2566ba982
-
SSDEEP
6144:5BXsAHqxGN77V2NBHJ8T+1ZD9iCPsTsoQF+i4GPBycvYP4Lwn:LcZI6XZD9in3S+iXUcAJ
Static task
static1
Behavioral task
behavioral1
Sample
PO-2019-0206DR.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO-2019-0206DR.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
warzonerat
xilogrid.info:6080
Targets
-
-
Target
PO-2019-0206DR.exe
-
Size
684KB
-
MD5
26b437c0fac1ab41712f80cbacc028bb
-
SHA1
7af2f6e902aa95f030453618875b5f6665b9d1b8
-
SHA256
00d8516cf44beee7b16042dc82dca4a1353e0f1a06210f8f5a576f8451e2c052
-
SHA512
db626946cae02de525008e04519f4e7bd7523ae78e4a6446b6fb9c3a37312bb3edb7ed766867723e8484856a9b3efdb14965be0dfee2214117d58dbd8ed432ce
-
SSDEEP
12288:H4QycNStCd0cDF2m/4q+wAfFjy2A0rJvjI/6dJyL/mU7obiS3Ii5W+JoljtH8lFf:YSSoNDF2m/4q+wAfFjy2A0FvjI/6dJyK
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-