General
-
Target
00cfc622f0d5e33fa8f48a91cc97a8c5b49c9107d6b24868c109aeb81d02f933N
-
Size
1.3MB
-
Sample
240918-j73sja1gpk
-
MD5
7148399940faac2bce44b5dd77a32c90
-
SHA1
937848f3a1bc8ea87c645bf858ad97e353a0fa7c
-
SHA256
00cfc622f0d5e33fa8f48a91cc97a8c5b49c9107d6b24868c109aeb81d02f933
-
SHA512
55f005e12c1b7f6b303fdea8bb07c2b0c76b8fa07ae08eeb3d9b90179b88f07382634e9caa467715b8513c9ce735e94d5c3752da20b1672097de0300830307f7
-
SSDEEP
24576:Ku6J33O0c+JY5UZ+XC0kGso6Fa720W4njUprvVcC1f2o5RRfgUWYS:8u0c++OCvkGs9Fa+rd1f26RaYS
Behavioral task
behavioral1
Sample
00cfc622f0d5e33fa8f48a91cc97a8c5b49c9107d6b24868c109aeb81d02f933N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
00cfc622f0d5e33fa8f48a91cc97a8c5b49c9107d6b24868c109aeb81d02f933N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Targets
-
-
Target
00cfc622f0d5e33fa8f48a91cc97a8c5b49c9107d6b24868c109aeb81d02f933N
-
Size
1.3MB
-
MD5
7148399940faac2bce44b5dd77a32c90
-
SHA1
937848f3a1bc8ea87c645bf858ad97e353a0fa7c
-
SHA256
00cfc622f0d5e33fa8f48a91cc97a8c5b49c9107d6b24868c109aeb81d02f933
-
SHA512
55f005e12c1b7f6b303fdea8bb07c2b0c76b8fa07ae08eeb3d9b90179b88f07382634e9caa467715b8513c9ce735e94d5c3752da20b1672097de0300830307f7
-
SSDEEP
24576:Ku6J33O0c+JY5UZ+XC0kGso6Fa720W4njUprvVcC1f2o5RRfgUWYS:8u0c++OCvkGs9Fa+rd1f26RaYS
-
NetWire RAT payload
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-