General

  • Target

    Roominglist.js

  • Size

    167KB

  • Sample

    210520-5378dkavxj

  • MD5

    ed8cae0f23bab8b9b0b591858e9b2ede

  • SHA1

    7c22f8392d58cbe98069f519f348b56228865bca

  • SHA256

    b045aaa5531d999fd24dc75da1df6a9f56402225aeed8269297bbfafecf18147

  • SHA512

    946df5fd66af4c4b2fb8c1276be2ffa2034be5ee8ed484eea517a477cde97cb4a5bd78707fdc8443714850c946a667a717e343c5a2f1ba4242f6d5ecf9a6a304

Malware Config

Extracted

Family

warzonerat

C2

global22.ddns.net:8080

Targets

    • Target

      Roominglist.js

    • Size

      167KB

    • MD5

      ed8cae0f23bab8b9b0b591858e9b2ede

    • SHA1

      7c22f8392d58cbe98069f519f348b56228865bca

    • SHA256

      b045aaa5531d999fd24dc75da1df6a9f56402225aeed8269297bbfafecf18147

    • SHA512

      946df5fd66af4c4b2fb8c1276be2ffa2034be5ee8ed484eea517a477cde97cb4a5bd78707fdc8443714850c946a667a717e343c5a2f1ba4242f6d5ecf9a6a304

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks