General
-
Target
JaffaCakes118_340c89b2f53261125d86d2289fd65456
-
Size
1.3MB
-
Sample
241231-yxy4xsxkcs
-
MD5
340c89b2f53261125d86d2289fd65456
-
SHA1
4cf8364eeb744304775a3037da631c6b0cffa19a
-
SHA256
f25660daa72c172425bc14dd48d5aaa52fd87b6babecc911e12b39b5e51954d0
-
SHA512
165faf95ae82cccdbf3eb47def07953f17fbe11c85c2db2db12b87cc02d1b515d9f2d5c3c276c149206b7f5eef72058aaa2c95d70ac57a658790d0d350b13444
-
SSDEEP
6144:DuW80WhmQDzYm00RiTwSltgxCKYPMXq9NmiQBYGhpX8x4MWy1FYCz8hJ2n3C+8JD:DuWoJ4D4pa7+o4H
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_340c89b2f53261125d86d2289fd65456.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_340c89b2f53261125d86d2289fd65456.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
warzonerat
win64pooldrv.ddns.net:9010
Targets
-
-
Target
JaffaCakes118_340c89b2f53261125d86d2289fd65456
-
Size
1.3MB
-
MD5
340c89b2f53261125d86d2289fd65456
-
SHA1
4cf8364eeb744304775a3037da631c6b0cffa19a
-
SHA256
f25660daa72c172425bc14dd48d5aaa52fd87b6babecc911e12b39b5e51954d0
-
SHA512
165faf95ae82cccdbf3eb47def07953f17fbe11c85c2db2db12b87cc02d1b515d9f2d5c3c276c149206b7f5eef72058aaa2c95d70ac57a658790d0d350b13444
-
SSDEEP
6144:DuW80WhmQDzYm00RiTwSltgxCKYPMXq9NmiQBYGhpX8x4MWy1FYCz8hJ2n3C+8JD:DuWoJ4D4pa7+o4H
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-