General
-
Target
JaffaCakes118_84382464821861034a77bc19a26d3525
-
Size
423KB
-
Sample
250105-cfmtnsxnaw
-
MD5
84382464821861034a77bc19a26d3525
-
SHA1
ae595b1d8511cffc685c9658604cc68c5883978b
-
SHA256
80462a35c51383035ffc669cd040fe9e3bf8e76177e3d6a71edabe7343b76356
-
SHA512
d5a7fea55176104f06334ce3802d577a8b5997ed095fedc56bc827bfb88e21dd3299f1f2bd21fc0e6f2975757dedab8173c345029ef2d54dea579b75610f18d9
-
SSDEEP
12288:H7zHxVQ9WxVRhWCmO0cMqnQyuw6z5OaFlzkS34FiVR61a6YYYWiUPLbwbB9OUtX1:8KEMGLeQ3em
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_84382464821861034a77bc19a26d3525.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_84382464821861034a77bc19a26d3525.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
warzonerat
185.140.53.188:4020
Targets
-
-
Target
JaffaCakes118_84382464821861034a77bc19a26d3525
-
Size
423KB
-
MD5
84382464821861034a77bc19a26d3525
-
SHA1
ae595b1d8511cffc685c9658604cc68c5883978b
-
SHA256
80462a35c51383035ffc669cd040fe9e3bf8e76177e3d6a71edabe7343b76356
-
SHA512
d5a7fea55176104f06334ce3802d577a8b5997ed095fedc56bc827bfb88e21dd3299f1f2bd21fc0e6f2975757dedab8173c345029ef2d54dea579b75610f18d9
-
SSDEEP
12288:H7zHxVQ9WxVRhWCmO0cMqnQyuw6z5OaFlzkS34FiVR61a6YYYWiUPLbwbB9OUtX1:8KEMGLeQ3em
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-