General

  • Target

    Pago.20120412.doc

  • Size

    696KB

  • Sample

    210412-z4plcxr9hj

  • MD5

    81dd489e42f29b03815d2533e8e89b94

  • SHA1

    a379c3031448a4ecc9e42816912f5328cd8ca467

  • SHA256

    f72c86685e49999377ce344c9fa547abb9c7fa979f68bbc0e9a7bfe28aee309d

  • SHA512

    0f6379b31bf18590dc230770da73c7f0eb086e07b9af85a269708cdb52e9d5f55d8b67961b69229b5ebf44a855fb4065f6694e1b3aa075062704b0c4b9ec4005

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

httP://101.99.91.200/tk.exe

Extracted

Family

warzonerat

C2

101.99.91.200:5200

Targets

    • Target

      Pago.20120412.doc

    • Size

      696KB

    • MD5

      81dd489e42f29b03815d2533e8e89b94

    • SHA1

      a379c3031448a4ecc9e42816912f5328cd8ca467

    • SHA256

      f72c86685e49999377ce344c9fa547abb9c7fa979f68bbc0e9a7bfe28aee309d

    • SHA512

      0f6379b31bf18590dc230770da73c7f0eb086e07b9af85a269708cdb52e9d5f55d8b67961b69229b5ebf44a855fb4065f6694e1b3aa075062704b0c4b9ec4005

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Drops startup file

    • Loads dropped DLL

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

3
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Remote System Discovery

1
T1018

Tasks