General
-
Target
RTC_Launcher.exe
-
Size
642KB
-
Sample
250517-sseltsaj3z
-
MD5
aa4a09b39e2f72a5de8a474893930b0b
-
SHA1
2dd5a014d3a1bc46e5caa0f64fdf6367e2d1fd75
-
SHA256
8f7a2e285633068b4aaac96a8c0335c6e015cbe1f297b9a67b71c20505b743c4
-
SHA512
97488b8cddb73d34daa9775cfe617ccd045ad009ca5b069c967c5efef8f6a6c1b86f5521d6b5eb49c232d69fe75c6d5a7e62bd915f316326a5941e5d3ca85b45
-
SSDEEP
12288:ENoZIcBkqjVnl36ud0zR/6CtQ9PUHIG8DZ:2oZzkqjVnlqud+/2P+A
Static task
static1
Behavioral task
behavioral1
Sample
RTC_Launcher.exe
Resource
win10ltsc2021-20250425-en
Malware Config
Extracted
metasploit
windows/download_exec
http://149.129.72.37:23456/SNpK
- headers User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; NP09; NP09; MAAU)
Extracted
warzonerat
168.61.222.215:5400
Targets
-
-
Target
RTC_Launcher.exe
-
Size
642KB
-
MD5
aa4a09b39e2f72a5de8a474893930b0b
-
SHA1
2dd5a014d3a1bc46e5caa0f64fdf6367e2d1fd75
-
SHA256
8f7a2e285633068b4aaac96a8c0335c6e015cbe1f297b9a67b71c20505b743c4
-
SHA512
97488b8cddb73d34daa9775cfe617ccd045ad009ca5b069c967c5efef8f6a6c1b86f5521d6b5eb49c232d69fe75c6d5a7e62bd915f316326a5941e5d3ca85b45
-
SSDEEP
12288:ENoZIcBkqjVnl36ud0zR/6CtQ9PUHIG8DZ:2oZzkqjVnlqud+/2P+A
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
-
Warzonerat family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Warzone RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Office macro that triggers on suspicious action
Office document macro which triggers in special circumstances - often malicious.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Execution
Scheduled Task/Job
1Scheduled Task
1Windows Management Instrumentation
1Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
2File Deletion
2