General

  • Target

    c1ad9cbcb7bad8a5ae3f13752bab68a1.exe

  • Size

    847KB

  • Sample

    210116-2v4mcwszgj

  • MD5

    c1ad9cbcb7bad8a5ae3f13752bab68a1

  • SHA1

    114ebd72632913e4641b03d9e7eed01f1c0362e8

  • SHA256

    10de29d6ca34f4ba474a432588dcab2d09356fb4b3a323075c04c81c45200095

  • SHA512

    f284b853f83ec1e44983f889ae6e15f1b086d4d009115865c05e72a1543b1140ac0dc3d6a5a2b4384c9e98bad74e61dcf836378a7200747d97c6ff5231a519ab

Malware Config

Extracted

Family

warzonerat

C2

23.105.131.198:5300

Targets

    • Target

      c1ad9cbcb7bad8a5ae3f13752bab68a1.exe

    • Size

      847KB

    • MD5

      c1ad9cbcb7bad8a5ae3f13752bab68a1

    • SHA1

      114ebd72632913e4641b03d9e7eed01f1c0362e8

    • SHA256

      10de29d6ca34f4ba474a432588dcab2d09356fb4b3a323075c04c81c45200095

    • SHA512

      f284b853f83ec1e44983f889ae6e15f1b086d4d009115865c05e72a1543b1140ac0dc3d6a5a2b4384c9e98bad74e61dcf836378a7200747d97c6ff5231a519ab

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks