General
-
Target
f24d59279f299f748712a80f541b4e98_JaffaCakes118
-
Size
438KB
-
Sample
240922-sy76bswhmp
-
MD5
f24d59279f299f748712a80f541b4e98
-
SHA1
a6a23792bb2bf2e6a1a9203e0b338595a72ce962
-
SHA256
c7f3fef1db8a9ac732f862e802453a901aa42797f3d113feedab70b793b72b60
-
SHA512
ab2dc0d6b716e9047ebc77366d5a35b9a7b6f865ae992c5517e0ef1a23d11438bce06c98655f6a5e3f35532d1bff8eab1ab0761894076f4b3767e23bae82c7a6
-
SSDEEP
12288:HDXi6ZnMNnqioinmBW+FWEOu4BNtZWC2V:jXnZnsntoin1+j4BNS
Static task
static1
Behavioral task
behavioral1
Sample
f24d59279f299f748712a80f541b4e98_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f24d59279f299f748712a80f541b4e98_JaffaCakes118.exe
Resource
win10v2004-20240910-en
Malware Config
Extracted
warzonerat
tain77.duckdns.org:5200
Targets
-
-
Target
f24d59279f299f748712a80f541b4e98_JaffaCakes118
-
Size
438KB
-
MD5
f24d59279f299f748712a80f541b4e98
-
SHA1
a6a23792bb2bf2e6a1a9203e0b338595a72ce962
-
SHA256
c7f3fef1db8a9ac732f862e802453a901aa42797f3d113feedab70b793b72b60
-
SHA512
ab2dc0d6b716e9047ebc77366d5a35b9a7b6f865ae992c5517e0ef1a23d11438bce06c98655f6a5e3f35532d1bff8eab1ab0761894076f4b3767e23bae82c7a6
-
SSDEEP
12288:HDXi6ZnMNnqioinmBW+FWEOu4BNtZWC2V:jXnZnsntoin1+j4BNS
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-