General
-
Target
cc0fdb6946afd11917588ce448b752e3f49debcd09d2e4d6c6d04cc1dc774e92
-
Size
610KB
-
Sample
241128-zk3r1szmfy
-
MD5
06fe875e4701de15eb98fef1e228d32b
-
SHA1
cca987129e4a7ce3a9853e419ccdac32130310d3
-
SHA256
cc0fdb6946afd11917588ce448b752e3f49debcd09d2e4d6c6d04cc1dc774e92
-
SHA512
276b4d6d9e4e5f7176adc19fc38c377179847d76ac53ee49dc7a318cab3a222115aa96cc90ded61f4ef6a724d0a782da5f0315867f55045ed31fbc822f436e5e
-
SSDEEP
12288:NqrK4A9bRZmqRiYmeTLBxg6NEtuhc07M6qAvqp9YfvkR:UrKHmqnmiLBx5NEYhcmM6q8qp2q
Static task
static1
Behavioral task
behavioral1
Sample
cc0fdb6946afd11917588ce448b752e3f49debcd09d2e4d6c6d04cc1dc774e92.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cc0fdb6946afd11917588ce448b752e3f49debcd09d2e4d6c6d04cc1dc774e92.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
warzonerat
176.223.112.134:4268
Targets
-
-
Target
cc0fdb6946afd11917588ce448b752e3f49debcd09d2e4d6c6d04cc1dc774e92
-
Size
610KB
-
MD5
06fe875e4701de15eb98fef1e228d32b
-
SHA1
cca987129e4a7ce3a9853e419ccdac32130310d3
-
SHA256
cc0fdb6946afd11917588ce448b752e3f49debcd09d2e4d6c6d04cc1dc774e92
-
SHA512
276b4d6d9e4e5f7176adc19fc38c377179847d76ac53ee49dc7a318cab3a222115aa96cc90ded61f4ef6a724d0a782da5f0315867f55045ed31fbc822f436e5e
-
SSDEEP
12288:NqrK4A9bRZmqRiYmeTLBxg6NEtuhc07M6qAvqp9YfvkR:UrKHmqnmiLBx5NEYhcmM6q8qp2q
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-