Resubmissions

17-07-2021 08:51

210717-pb9y65dfpe 10

05-11-2020 03:55

201105-tr1wdy5fgn 10

General

  • Target

    new.bin.zip

  • Size

    269KB

  • Sample

    201105-tr1wdy5fgn

  • MD5

    2acf48abf989898d6bcf8dddfd8d621d

  • SHA1

    a9a468bb3740b868b80330f5849d11ca2803660d

  • SHA256

    39fb1a47b9dd909768be83b9e05f2c883dc20f43397cc5bfa772268a1c61bd5d

  • SHA512

    64864371ea613fc48c2c29252956c86010c65327bc3225d0150ccc3504d8e7016429cebbe8fd8f91732d15b0c2c10da71b0ebe4cc1150d887c80cf54588d5460

Malware Config

Targets

    • Target

      new.bin

    • Size

      1.6MB

    • MD5

      40e3805e5cad44b618fd0656ec933c9c

    • SHA1

      ae638966794b68432c4fcc78acc0ac3375f9a842

    • SHA256

      7dd1dba508f4b74d50a22f41f0efe3ff4bc30339e9eef45d390d32de2aa2ca2b

    • SHA512

      97c8388ccdc0af8945c241133cfb0953359ccbc476e516bd555fa94f0f4348dc27832af4ab8334f9559caeda0c090edd6596e7b9ee0fcd5aefb89721bc7257ef

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • ServiceHost packer

      Detects ServiceHost packer used for .NET malware

    • Warzone RAT Payload

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • JavaScript code in executable

    • Modifies WinLogon

    • Drops file in System32 directory

    • Modifies service

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Winlogon Helper DLL

1
T1004

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

4
T1112

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks