General
-
Target
21aea7934aee995629e68e5834695608.bin
-
Size
268KB
-
Sample
241212-bgqraazjcq
-
MD5
996e086fda881f3db974c55da46d1b8a
-
SHA1
e77685a9c3b715d2b16d960a79c10e81bb2ea616
-
SHA256
57ccd7e81acdd5b28bf3307818952e146c3d32ed9d76efda5ca5f208c1be5f39
-
SHA512
61bf7583a5268555ec6ba8572a4c4b75aac9a5e5ec462084ce6f88b1ce2b99660e16d98cd5b38d1dbb0a247af67b14e4b16b175354305414af81bcc8462dfd9f
-
SSDEEP
6144:1W23DGtQef90n6jwm6e0k+STwEhdjOQFw7e/BmFMRzvBDY4nvznPGujcmk/c:1HSL90n6jiAwEh9OQW65m2zvBDZTPGuF
Static task
static1
Behavioral task
behavioral1
Sample
1f6feae633a783cf6ef08eee6b65049fe5b692c8a743af8967984e2e212a06b5.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1f6feae633a783cf6ef08eee6b65049fe5b692c8a743af8967984e2e212a06b5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
warzonerat
dns.stipamana.com:5219
Targets
-
-
Target
1f6feae633a783cf6ef08eee6b65049fe5b692c8a743af8967984e2e212a06b5.exe
-
Size
275KB
-
MD5
21aea7934aee995629e68e5834695608
-
SHA1
94e690f33e0f7b8ea8a1c665359836b363cc09a5
-
SHA256
1f6feae633a783cf6ef08eee6b65049fe5b692c8a743af8967984e2e212a06b5
-
SHA512
b25883eecaa34a355047c4c6c0f684298f2803e757ffb3fdc6b097c62283e96b6801cafa3eaab9eb49df79c2abefebcc5d53816b877bd9ce108864785942b0ad
-
SSDEEP
6144:1b0neHPqlbJjsye59MQwtBakPHyxqZ3I6qGtVmIt2M3FraeLh87knbqbNyd:2neSbJOD5WXuqZ3IxGtPtBZae1M+mM
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-