Resubmissions

19-01-2021 19:03

210119-pz5pj1n8mx 10

19-01-2021 13:10

210119-acqakxycrn 10

General

  • Target

    SHIPPING DOCUMENT.exe

  • Size

    894KB

  • Sample

    210119-acqakxycrn

  • MD5

    df83820db281080e66e57ca20f2b7f45

  • SHA1

    eaf95598907bbcfc067ea97529661e849e369600

  • SHA256

    1b239419c0f7b8b7fee565928beaaee9c32d0897a1f4948f72a7a5339fd60b31

  • SHA512

    092c428ec3aea82ca1c278d334147aedd347713bca6fcfe3f5035a2890031a9159038df36c3ea9812d059530edc7b953326c6c601cd09e8bbf16fc763b10c2fc

Malware Config

Extracted

Family

warzonerat

C2

40.84.216.183:7600

Targets

    • Target

      SHIPPING DOCUMENT.exe

    • Size

      894KB

    • MD5

      df83820db281080e66e57ca20f2b7f45

    • SHA1

      eaf95598907bbcfc067ea97529661e849e369600

    • SHA256

      1b239419c0f7b8b7fee565928beaaee9c32d0897a1f4948f72a7a5339fd60b31

    • SHA512

      092c428ec3aea82ca1c278d334147aedd347713bca6fcfe3f5035a2890031a9159038df36c3ea9812d059530edc7b953326c6c601cd09e8bbf16fc763b10c2fc

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks