General
-
Target
ebcc2fa4fba63365245646c328496820_JaffaCakes118
-
Size
264KB
-
Sample
240919-vkyqvazglp
-
MD5
ebcc2fa4fba63365245646c328496820
-
SHA1
de10b42f1392974170b6d27470c71dcd4566e8b9
-
SHA256
e752991d6d0afc4b75df343f9aecd0d5313eface1882b50b72d0457e0bcd4096
-
SHA512
36c578c5898f456dd4028f11ddf33859b896ca91aab44576fb9215cbca3d2ee086b550cf9cc7da0652f975cf262ef74f3453dc4dbfc1a2c83edd026fbd5b6ea1
-
SSDEEP
6144:nP+DFeRNO6JrjT/nhfi+NJEFd3YIDsfTtXuZrZN5lCzk2sl:nP+cRfJrv/E+NJEF2duvNXufsl
Static task
static1
Behavioral task
behavioral1
Sample
Order_15032019.pdf.scr
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Order_15032019.pdf.scr
Resource
win10v2004-20240802-en
Malware Config
Extracted
warzonerat
openheaven.warzonedns.com:25122
Targets
-
-
Target
Order_15032019.pdf.scr
-
Size
322KB
-
MD5
bf49ec30267d7324e2f1dbcd5ff2f0cf
-
SHA1
7ab3fc626912eb493a6a13f0782cf2188033dc52
-
SHA256
f5442eff0797bd4eec5381f191a07a811b63b8c77fd88f6f65deabf841949e42
-
SHA512
5f951cdd3d682b837dc4969967876294a401fc05f76464fcff6d82ed4cd3eacc75e28c8d2839c6ec12056123245069b3dc31b32717b046c2d3cf761d4d387caf
-
SSDEEP
6144:CvVJT9KvY8Iwbd4HqdE8sgJYtZfbGioIS7AwZc6H31UGAhwjDDaExGgkMTZF38cz:CNJTMvfXWHD0YtFbGbFAH6HlTEwjD+UD
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Suspicious use of SetThreadContext
-