General

  • Target

    20210007 Purchase Order.exe

  • Size

    866KB

  • Sample

    210119-srmhchlm22

  • MD5

    2cb1e8b8664b60243ae9d779d722f15b

  • SHA1

    68189a8354d045a0dc176e8580fe0974a393cdb7

  • SHA256

    de752497070302674c9ff806fc9c905d9ca2db93d8d6241d4849da79394fe172

  • SHA512

    0790c9577f4b19280e3f3ee6eb4f397b4cc368c9bf82b8364760939c0dfcfd53b7aa7cb3beb3b469f6fde87a235e858c3f8cffa46d0c035a5697ad5a2a4c27b7

Malware Config

Extracted

Family

warzonerat

C2

52.146.42.226:5600

Targets

    • Target

      20210007 Purchase Order.exe

    • Size

      866KB

    • MD5

      2cb1e8b8664b60243ae9d779d722f15b

    • SHA1

      68189a8354d045a0dc176e8580fe0974a393cdb7

    • SHA256

      de752497070302674c9ff806fc9c905d9ca2db93d8d6241d4849da79394fe172

    • SHA512

      0790c9577f4b19280e3f3ee6eb4f397b4cc368c9bf82b8364760939c0dfcfd53b7aa7cb3beb3b469f6fde87a235e858c3f8cffa46d0c035a5697ad5a2a4c27b7

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks