General
-
Target
495607b1aef01bf7dfb64b5cb16a8fc0f161c2923627d71c69de97328f8eca3f.exe
-
Size
845KB
-
Sample
250113-gva6msyrhy
-
MD5
eff0087d8b3c6bc011c06d38838458e7
-
SHA1
cd4ff1fc19792b0f8b8c4ce9adfcfca6e386e6a2
-
SHA256
495607b1aef01bf7dfb64b5cb16a8fc0f161c2923627d71c69de97328f8eca3f
-
SHA512
8819dac67e7f348e19fa0f516019266d6e42bfcc615bafd996a05efb89244e6b1a0eaab319fd31222c4112b9cefde4b6c4cc3456b5bd319a773c2e3d123aec24
-
SSDEEP
12288:2nmIWkfNeH++znVXoW87FqKqi13U3mWxw7DG0mCuT7Yeg4firr:2mFkfY+WnVX18BqBAU3e5mnn3
Static task
static1
Behavioral task
behavioral1
Sample
495607b1aef01bf7dfb64b5cb16a8fc0f161c2923627d71c69de97328f8eca3f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
495607b1aef01bf7dfb64b5cb16a8fc0f161c2923627d71c69de97328f8eca3f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
warzonerat
panchak.duckdns.org:5050
Targets
-
-
Target
495607b1aef01bf7dfb64b5cb16a8fc0f161c2923627d71c69de97328f8eca3f.exe
-
Size
845KB
-
MD5
eff0087d8b3c6bc011c06d38838458e7
-
SHA1
cd4ff1fc19792b0f8b8c4ce9adfcfca6e386e6a2
-
SHA256
495607b1aef01bf7dfb64b5cb16a8fc0f161c2923627d71c69de97328f8eca3f
-
SHA512
8819dac67e7f348e19fa0f516019266d6e42bfcc615bafd996a05efb89244e6b1a0eaab319fd31222c4112b9cefde4b6c4cc3456b5bd319a773c2e3d123aec24
-
SSDEEP
12288:2nmIWkfNeH++znVXoW87FqKqi13U3mWxw7DG0mCuT7Yeg4firr:2mFkfY+WnVX18BqBAU3e5mnn3
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-