General
-
Target
88611b577a4e43b6321904fa166771d34c6848aebf361d847bf481e41681b583
-
Size
1.4MB
-
Sample
250208-c7y11ssjar
-
MD5
a968c4e4cbe6b83bc3ffeeca99c099b8
-
SHA1
76637d574412d40e235d883b1bb219045c587bb6
-
SHA256
88611b577a4e43b6321904fa166771d34c6848aebf361d847bf481e41681b583
-
SHA512
5101b98cb703f87f03b2cc1c1567e79900259fa2c35804068ff4249c274c5d66f70fcc231f80b2412e5243ce18042f0e579d9b9ad3c77e4bbdaeb21aaf10265f
-
SSDEEP
24576:ru6J3xO0c+JY5UZ+XCHkGso6Fa720W4njUprvVcC1f2o5RRfgdWYu:Fo0c++OCokGs9Fa+rd1f26RNYu
Behavioral task
behavioral1
Sample
88611b577a4e43b6321904fa166771d34c6848aebf361d847bf481e41681b583.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
88611b577a4e43b6321904fa166771d34c6848aebf361d847bf481e41681b583.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
netwire
Wealthy2019.com.strangled.net:20190
wealthyme.ddns.net:20190
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
sunshineslisa
-
install_path
%AppData%\Imgburn\Host.exe
-
keylogger_dir
%AppData%\Logs\Imgburn\
-
lock_executable
false
-
offline_keylogger
true
-
password
sucess
-
registry_autorun
false
-
use_mutex
false
Extracted
warzonerat
wealth.warzonedns.com:5202
Targets
-
-
Target
88611b577a4e43b6321904fa166771d34c6848aebf361d847bf481e41681b583
-
Size
1.4MB
-
MD5
a968c4e4cbe6b83bc3ffeeca99c099b8
-
SHA1
76637d574412d40e235d883b1bb219045c587bb6
-
SHA256
88611b577a4e43b6321904fa166771d34c6848aebf361d847bf481e41681b583
-
SHA512
5101b98cb703f87f03b2cc1c1567e79900259fa2c35804068ff4249c274c5d66f70fcc231f80b2412e5243ce18042f0e579d9b9ad3c77e4bbdaeb21aaf10265f
-
SSDEEP
24576:ru6J3xO0c+JY5UZ+XCHkGso6Fa720W4njUprvVcC1f2o5RRfgdWYu:Fo0c++OCokGs9Fa+rd1f26RNYu
-
NetWire RAT payload
-
Netwire family
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-