General
-
Target
9b8f33eff08c5e6990f345f102ec30032ea5f611dd89a6ef4058bec109c42824N
-
Size
1.3MB
-
Sample
241023-qv6f8avcmk
-
MD5
7108406a5a29763b7a73d292b95e42a0
-
SHA1
394e55ac8429495e9c7c305e79c2c3c7e10d4904
-
SHA256
9b8f33eff08c5e6990f345f102ec30032ea5f611dd89a6ef4058bec109c42824
-
SHA512
342a1146b9416046b3ac57e4b92625d659bbda8286e8cc56124f73e2e97948503cf9f4702f8e650bb66bce5f29353fcaff4bac8870d456fbac225a1edc1bb70f
-
SSDEEP
24576:Ku6J33O0c+JY5UZ+XC0kGso6Fa720W4njUprvVcC1f2o5RRfgUWY4:8u0c++OCvkGs9Fa+rd1f26RaY4
Behavioral task
behavioral1
Sample
9b8f33eff08c5e6990f345f102ec30032ea5f611dd89a6ef4058bec109c42824N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9b8f33eff08c5e6990f345f102ec30032ea5f611dd89a6ef4058bec109c42824N.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Targets
-
-
Target
9b8f33eff08c5e6990f345f102ec30032ea5f611dd89a6ef4058bec109c42824N
-
Size
1.3MB
-
MD5
7108406a5a29763b7a73d292b95e42a0
-
SHA1
394e55ac8429495e9c7c305e79c2c3c7e10d4904
-
SHA256
9b8f33eff08c5e6990f345f102ec30032ea5f611dd89a6ef4058bec109c42824
-
SHA512
342a1146b9416046b3ac57e4b92625d659bbda8286e8cc56124f73e2e97948503cf9f4702f8e650bb66bce5f29353fcaff4bac8870d456fbac225a1edc1bb70f
-
SSDEEP
24576:Ku6J33O0c+JY5UZ+XC0kGso6Fa720W4njUprvVcC1f2o5RRfgUWY4:8u0c++OCvkGs9Fa+rd1f26RaY4
-
NetWire RAT payload
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzone RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-