General
-
Target
325be1d623422763b0e16bc3c294cc5c006f6fb2ff8ddbf9eb0e45f8d8ac6853.exe
-
Size
870KB
-
Sample
241102-eaj7psxkat
-
MD5
76a9764d18535113e206f661a70764a3
-
SHA1
cbb20d9ad86fa8374553203efff7d6baadfaeaa7
-
SHA256
325be1d623422763b0e16bc3c294cc5c006f6fb2ff8ddbf9eb0e45f8d8ac6853
-
SHA512
4952c1cc85464b54bc55a1272a763e3a93c48cd3576f53e9212d746ab1dfffdf8925095526ff9b2c2039dd40d59162540a7c39d04eb1b83fb0cb99fa6185dcb0
-
SSDEEP
12288:GvfVhpeMc5IFhtCIUQvihNEJYcxoWUgL82DsijKZF61:GvfVs5oEIUTE9ygAzijKZs
Static task
static1
Behavioral task
behavioral1
Sample
325be1d623422763b0e16bc3c294cc5c006f6fb2ff8ddbf9eb0e45f8d8ac6853.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
325be1d623422763b0e16bc3c294cc5c006f6fb2ff8ddbf9eb0e45f8d8ac6853.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
warzonerat
185.29.8.102:3312
Targets
-
-
Target
325be1d623422763b0e16bc3c294cc5c006f6fb2ff8ddbf9eb0e45f8d8ac6853.exe
-
Size
870KB
-
MD5
76a9764d18535113e206f661a70764a3
-
SHA1
cbb20d9ad86fa8374553203efff7d6baadfaeaa7
-
SHA256
325be1d623422763b0e16bc3c294cc5c006f6fb2ff8ddbf9eb0e45f8d8ac6853
-
SHA512
4952c1cc85464b54bc55a1272a763e3a93c48cd3576f53e9212d746ab1dfffdf8925095526ff9b2c2039dd40d59162540a7c39d04eb1b83fb0cb99fa6185dcb0
-
SSDEEP
12288:GvfVhpeMc5IFhtCIUQvihNEJYcxoWUgL82DsijKZF61:GvfVs5oEIUTE9ygAzijKZs
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-