General
-
Target
f675e9e7887a04ae492160e25cbea933_JaffaCakes118
-
Size
2.2MB
-
Sample
240925-vjzazszdkd
-
MD5
f675e9e7887a04ae492160e25cbea933
-
SHA1
cba8bc539dc121dd943dba6d25482f340cfd607a
-
SHA256
6f888bfb577e35b282e35a1763429c21bf94651cd180e6ff26079a3ef25e712e
-
SHA512
a12ebbe3194726ff79b97970ab7c5dd8e742072b47e277b93c348174e2e4da5c551e637a23959c81c1e1e178c738f3273b2dbf538af1b76e0989e7360c5effea
-
SSDEEP
49152:anjW5Q6ipFhxlNpx0rmwxhf3OQZHeVGK4uGVD94:yd6iHsmwT39ZHeVGK48
Static task
static1
Behavioral task
behavioral1
Sample
f675e9e7887a04ae492160e25cbea933_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f675e9e7887a04ae492160e25cbea933_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
warzonerat
jackbaur75.linkpc.net:3230
Targets
-
-
Target
f675e9e7887a04ae492160e25cbea933_JaffaCakes118
-
Size
2.2MB
-
MD5
f675e9e7887a04ae492160e25cbea933
-
SHA1
cba8bc539dc121dd943dba6d25482f340cfd607a
-
SHA256
6f888bfb577e35b282e35a1763429c21bf94651cd180e6ff26079a3ef25e712e
-
SHA512
a12ebbe3194726ff79b97970ab7c5dd8e742072b47e277b93c348174e2e4da5c551e637a23959c81c1e1e178c738f3273b2dbf538af1b76e0989e7360c5effea
-
SSDEEP
49152:anjW5Q6ipFhxlNpx0rmwxhf3OQZHeVGK4uGVD94:yd6iHsmwT39ZHeVGK48
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Warzone RAT payload
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-