General
-
Target
Company Profile.vbs
-
Size
189KB
-
Sample
241007-fxk8ysxgpq
-
MD5
ee122a95d229ae3027779aaa863f11be
-
SHA1
46b92d71b1a3cfb213ea400f5e1e5cda0a7d7ce7
-
SHA256
9ad5fb5c8f0b886ed22e202f5bcfd8e8c4d0617b270660d0907ca8c87ac2f0b7
-
SHA512
4c088ea8528b6525fb284e42020e74c979c372f805495c23ee4c36635a2a6199203115ec5dbff523d0a1741a60e4612643aebadd44d81a288acd5a3c506b5cc6
-
SSDEEP
3072:c4ehYpD1tZytL6pMdHPppygt5ppGwt7iLnst+7PbcqMm+/QcZc51:c1eD1T4ZRWDcqj+/Q551
Static task
static1
Behavioral task
behavioral1
Sample
Company Profile.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Company Profile.vbs
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
Extracted
warzonerat
109.248.151.156:2048
Targets
-
-
Target
Company Profile.vbs
-
Size
189KB
-
MD5
ee122a95d229ae3027779aaa863f11be
-
SHA1
46b92d71b1a3cfb213ea400f5e1e5cda0a7d7ce7
-
SHA256
9ad5fb5c8f0b886ed22e202f5bcfd8e8c4d0617b270660d0907ca8c87ac2f0b7
-
SHA512
4c088ea8528b6525fb284e42020e74c979c372f805495c23ee4c36635a2a6199203115ec5dbff523d0a1741a60e4612643aebadd44d81a288acd5a3c506b5cc6
-
SSDEEP
3072:c4ehYpD1tZytL6pMdHPppygt5ppGwt7iLnst+7PbcqMm+/QcZc51:c1eD1T4ZRWDcqj+/Q551
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-