General
-
Target
9f3b4aeb89292766abccc7e26f7a3b62f12a1ad09b96643157a861280bb45af3N
-
Size
1.4MB
-
Sample
240920-r81nkasepk
-
MD5
649e6486aa914b2154e0574f7b9e4960
-
SHA1
17283159a0fc0c703c1a32c3ee6eaf1778285cc0
-
SHA256
9f3b4aeb89292766abccc7e26f7a3b62f12a1ad09b96643157a861280bb45af3
-
SHA512
6e5545fcfb8fd5c2c9cf7adbb72abf6444374966022dee402936ba79691e2ea7585c8cda035dfab353b47fb7c17b90eaaf9d3534137cde730217323d167ef439
-
SSDEEP
24576:ru6J3xO0c+JY5UZ+XCHkGso6Fa720W4njUprvVcC1f2o5RRfgdWYg:Fo0c++OCokGs9Fa+rd1f26RNYg
Behavioral task
behavioral1
Sample
9f3b4aeb89292766abccc7e26f7a3b62f12a1ad09b96643157a861280bb45af3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9f3b4aeb89292766abccc7e26f7a3b62f12a1ad09b96643157a861280bb45af3N.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Targets
-
-
Target
9f3b4aeb89292766abccc7e26f7a3b62f12a1ad09b96643157a861280bb45af3N
-
Size
1.4MB
-
MD5
649e6486aa914b2154e0574f7b9e4960
-
SHA1
17283159a0fc0c703c1a32c3ee6eaf1778285cc0
-
SHA256
9f3b4aeb89292766abccc7e26f7a3b62f12a1ad09b96643157a861280bb45af3
-
SHA512
6e5545fcfb8fd5c2c9cf7adbb72abf6444374966022dee402936ba79691e2ea7585c8cda035dfab353b47fb7c17b90eaaf9d3534137cde730217323d167ef439
-
SSDEEP
24576:ru6J3xO0c+JY5UZ+XCHkGso6Fa720W4njUprvVcC1f2o5RRfgdWYg:Fo0c++OCokGs9Fa+rd1f26RNYg
-
NetWire RAT payload
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-