General
-
Target
JhHhHhHh.rar
-
Size
231KB
-
Sample
240912-jbl5xayblb
-
MD5
182c781597e598e58d744b7f2da8fe39
-
SHA1
c4869884bf4acb242ae57740a1c38cce7735b2ab
-
SHA256
91bb1e8e29c4d6642e68376263e655a1d521fdfbfb68fbd406ba7f109d261ae1
-
SHA512
900946a2854c38de225c95bf55ceeeedaed12646398e3a929b2c9a9ade3e2be1adf60f8c65d7ca619890b854646b81ddd954b9831e7ad922c18a299c701c87d6
-
SSDEEP
6144:RcL2IaXfJspxvZYahmMCNsfQrcYl1RCJBFUVR31Ete/e9:R+21OFZYah/EsYrV1RgBFUVR3yte/G
Static task
static1
Behavioral task
behavioral1
Sample
JhHhHhHh.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
warzonerat
wzoner.duckdns.org:5355
Targets
-
-
Target
JhHhHhHh.exe
-
Size
280KB
-
MD5
a7f32a8e11125a2b976ce58edfaca4cf
-
SHA1
4f57f407cfe662b86b9aa34bf272ed1a6a7d0d7a
-
SHA256
ffb8a170828d3de522aa7e5fc90da90c099a7da01a8255d5158150cae85d3690
-
SHA512
b9ac4ceb8c3b20a6afbbc42f66a13fc68562df896de6b673d70cf162d6d09ad74edcfd0fac6baba77a6246b4cae8d75f9e55d7caa849c63d00f10fc134042c20
-
SSDEEP
6144:cZ9LtXY3v+6PoBE5qGsAWiffVNBy0O12udoEUAEGpJwn4:cPhXu9Po8ZWi3JwldEOp
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-