General
-
Target
e80cbbe125f0c5d634f002cd993d54751e5d62db9e6ab781d59dd6464286ec7f
-
Size
182KB
-
Sample
240923-bany4s1gnl
-
MD5
a7418cd58691071149a4006f398a4b31
-
SHA1
2bc66adad051165c4ac5f85601e50c4eef591e14
-
SHA256
e80cbbe125f0c5d634f002cd993d54751e5d62db9e6ab781d59dd6464286ec7f
-
SHA512
f0c66cb2d21bbeb5f7550962eacaa09970e7f26241e1bcdbe72313eb824d2660c3f49b6b51de1eb6e48dd5164351fd511c89696bc083201be3bfb753da888b5c
-
SSDEEP
3072:MsIf/BetA+4Ak5TOJ2+I07XjryLNMr9FDwmDvFcdDhQ6fSkzoGWfbqJKIzg:NfAfAaOIEvyLNMJFDwmToG6f5zJMmg
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY_0002341259-SCB.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
INQUIRY_0002341259-SCB.vbs
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
Extracted
warzonerat
109.248.151.156:2048
Targets
-
-
Target
INQUIRY_0002341259-SCB.vbs
-
Size
507KB
-
MD5
8826da2dae531f219269ca314cec4f88
-
SHA1
a5c24e29d2b9901a0849fe4c70dd67733febcb57
-
SHA256
3ca2d0a1abba4f885e740032d2314993fac09ffffe14a4c6a89aacf65684e45b
-
SHA512
9899a75d918671927f0dce5824135427899d75c88c153f78e8fa9ca5d39383a2cb33d092376ae631f507a3bd855636968724d9509d180e2c3a0a307a697e7de5
-
SSDEEP
12288:r4IJKsC/UX6neBCN6Jy7f24Sjmr8NeAkWrIXbl/MCmgdTQFq30+XDNNRsgbZAKIo:kkgn2MHhso/
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Warzone RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-