General

  • Target

    ReQUOTATION_REQUEST20200829.exe

  • Size

    712KB

  • Sample

    200828-765px28e4j

  • MD5

    2114535592ff9c28d5bd897c10caada2

  • SHA1

    dd06260610bc0a4dbfcb0778cd4fdf703e10770e

  • SHA256

    30690dd57acb0fdd1b40b8985089381f463d9cc0601605782624283be72be025

  • SHA512

    c66835bd7c66a1c957f13257718dc36b8f94af8211995cf776b4dff97e1420bf2be926de64153e4ef6f6a96e8e05fe7d39611a6eb7d6c3b6f3b7f2cc8f3f7537

Malware Config

Targets

    • Target

      ReQUOTATION_REQUEST20200829.exe

    • Size

      712KB

    • MD5

      2114535592ff9c28d5bd897c10caada2

    • SHA1

      dd06260610bc0a4dbfcb0778cd4fdf703e10770e

    • SHA256

      30690dd57acb0fdd1b40b8985089381f463d9cc0601605782624283be72be025

    • SHA512

      c66835bd7c66a1c957f13257718dc36b8f94af8211995cf776b4dff97e1420bf2be926de64153e4ef6f6a96e8e05fe7d39611a6eb7d6c3b6f3b7f2cc8f3f7537

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks