General
-
Target
e20d35f98482f8c1f6e12f62c4c7136add7ef0fa7c09fc82bce4f958831d8c74
-
Size
182KB
-
Sample
240923-bard8s1fra
-
MD5
24d3728d150290dc491b32c0d71c152f
-
SHA1
d6ee4233fc400e02ba96b3fb692344f344e461e9
-
SHA256
e20d35f98482f8c1f6e12f62c4c7136add7ef0fa7c09fc82bce4f958831d8c74
-
SHA512
a2afb7a910f0f9235bc51d28f84a3c1c3f5a143ad44bd0355663d4c4cdd2ea2beaf27d48606860e08bebf46515996313cbbb37529858d79a1c6002dee4f1c3c0
-
SSDEEP
3072:JsIf/BetA+4Ak5TOJ2+I07XjryLNMr9FDwmDvFcdDhQ6fSkzoGWfbqJKIzo:GfAfAaOIEvyLNMJFDwmToG6f5zJMmo
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER_0002341259-SCB.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER_0002341259-SCB.vbs
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
Extracted
warzonerat
109.248.151.156:2048
Targets
-
-
Target
PURCHASE ORDER_0002341259-SCB.vbs
-
Size
507KB
-
MD5
8826da2dae531f219269ca314cec4f88
-
SHA1
a5c24e29d2b9901a0849fe4c70dd67733febcb57
-
SHA256
3ca2d0a1abba4f885e740032d2314993fac09ffffe14a4c6a89aacf65684e45b
-
SHA512
9899a75d918671927f0dce5824135427899d75c88c153f78e8fa9ca5d39383a2cb33d092376ae631f507a3bd855636968724d9509d180e2c3a0a307a697e7de5
-
SSDEEP
12288:r4IJKsC/UX6neBCN6Jy7f24Sjmr8NeAkWrIXbl/MCmgdTQFq30+XDNNRsgbZAKIo:kkgn2MHhso/
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Warzone RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-