General
-
Target
2025-04-15_0b019016508a828c0ee4a8b690abe2bd_black-basta_elex_luca-stealer_metamorfo
-
Size
1019KB
-
Sample
250415-fbw4bsxrz3
-
MD5
0b019016508a828c0ee4a8b690abe2bd
-
SHA1
a26dff2992ae833d5af1d3da4a9ec678e6dee58e
-
SHA256
a9f5ff12d64cfdf5555adbe1931f80679075d7d1215a67fd57b1728f451a2d91
-
SHA512
e050d6a0ab3c6840d0ca695a9c4f244bff5b98c086414673a2a8a64092f6c12fe28dbd25414e879576910d43f919a0ab393738c5b4e3b3918a937db55ea0efd1
-
SSDEEP
12288:9crNS33L10QdrXi4P7r9r/+ppppppppppppppppppppppppppppp0GHpneWemGWg:ANA3R5drXj1qHpeWWWT3IFTw79EvE08k
Static task
static1
Behavioral task
behavioral1
Sample
2025-04-15_0b019016508a828c0ee4a8b690abe2bd_black-basta_elex_luca-stealer_metamorfo.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
warzonerat
bhirtyfive55.ydns.eu:5210
Targets
-
-
Target
2025-04-15_0b019016508a828c0ee4a8b690abe2bd_black-basta_elex_luca-stealer_metamorfo
-
Size
1019KB
-
MD5
0b019016508a828c0ee4a8b690abe2bd
-
SHA1
a26dff2992ae833d5af1d3da4a9ec678e6dee58e
-
SHA256
a9f5ff12d64cfdf5555adbe1931f80679075d7d1215a67fd57b1728f451a2d91
-
SHA512
e050d6a0ab3c6840d0ca695a9c4f244bff5b98c086414673a2a8a64092f6c12fe28dbd25414e879576910d43f919a0ab393738c5b4e3b3918a937db55ea0efd1
-
SSDEEP
12288:9crNS33L10QdrXi4P7r9r/+ppppppppppppppppppppppppppppp0GHpneWemGWg:ANA3R5drXj1qHpeWWWT3IFTw79EvE08k
Score10/10-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Warzone RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-