General
-
Target
JaffaCakes118_72073e830ab96af26475a2bf53846570
-
Size
430KB
-
Sample
250103-2gkhdaxjet
-
MD5
72073e830ab96af26475a2bf53846570
-
SHA1
04b2d4f58a763bf428e09e0517623cbb350ad8f5
-
SHA256
7008e3c7c828dfad8c3028ec4fdf4325ceff7fc71e64481f129764c72683fd32
-
SHA512
ad365bca8e6166c769878a97a65fa9019aa70d5e8e8a0e09820b981f0bf9cbbdb367ff99a56dbb7578674888e4f01c99e310b90429263e716f23587f8ef95181
-
SSDEEP
12288:XXqYEhqGzOMBszSNc5d6jT38xisVp2fRu:X6YEn3aOjTls
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_72073e830ab96af26475a2bf53846570.exe
Resource
win7-20240903-en
Malware Config
Extracted
warzonerat
kw9d0w.duckdns.org:4192
Targets
-
-
Target
JaffaCakes118_72073e830ab96af26475a2bf53846570
-
Size
430KB
-
MD5
72073e830ab96af26475a2bf53846570
-
SHA1
04b2d4f58a763bf428e09e0517623cbb350ad8f5
-
SHA256
7008e3c7c828dfad8c3028ec4fdf4325ceff7fc71e64481f129764c72683fd32
-
SHA512
ad365bca8e6166c769878a97a65fa9019aa70d5e8e8a0e09820b981f0bf9cbbdb367ff99a56dbb7578674888e4f01c99e310b90429263e716f23587f8ef95181
-
SSDEEP
12288:XXqYEhqGzOMBszSNc5d6jT38xisVp2fRu:X6YEn3aOjTls
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-