General
-
Target
JaffaCakes118_41ae0e35deb7fd034eb1062cfdae8f9e
-
Size
337KB
-
Sample
250101-bfzb2aymdw
-
MD5
41ae0e35deb7fd034eb1062cfdae8f9e
-
SHA1
0ba399852c7dfea389de099584fc500bc9fdbeb4
-
SHA256
0d148290c478dabca79975a77a5c2a5ae47f12c0c72c40e8fb93fdcb31c5c71e
-
SHA512
be3242e3334a5f5c5fbcb8f3ed0c76a659397aeb3e927db39ff3b9008c40039801237a7979a69c04ae1e1afa838ca65cf844648f44e7f6ade53af3969f740db0
-
SSDEEP
6144:LY1gnZ5uAKN66k5IGi4iWZNnP7MGbuXpdRME0KhY0gv:k+nLuAXjIGKWLnDBbC30Khxu
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_41ae0e35deb7fd034eb1062cfdae8f9e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_41ae0e35deb7fd034eb1062cfdae8f9e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
warzonerat
176.126.86.243:2021
Targets
-
-
Target
JaffaCakes118_41ae0e35deb7fd034eb1062cfdae8f9e
-
Size
337KB
-
MD5
41ae0e35deb7fd034eb1062cfdae8f9e
-
SHA1
0ba399852c7dfea389de099584fc500bc9fdbeb4
-
SHA256
0d148290c478dabca79975a77a5c2a5ae47f12c0c72c40e8fb93fdcb31c5c71e
-
SHA512
be3242e3334a5f5c5fbcb8f3ed0c76a659397aeb3e927db39ff3b9008c40039801237a7979a69c04ae1e1afa838ca65cf844648f44e7f6ade53af3969f740db0
-
SSDEEP
6144:LY1gnZ5uAKN66k5IGi4iWZNnP7MGbuXpdRME0KhY0gv:k+nLuAXjIGKWLnDBbC30Khxu
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-