General

  • Target

    023963ba_by_Libranalysis

  • Size

    20KB

  • Sample

    210520-jwyrfxlsxn

  • MD5

    023963bab1004036861c41fd4c26bae8

  • SHA1

    653718ee5b55fcab4f5b839405c5e31f8ab3e974

  • SHA256

    54d1e98bd018d14be58e6a9a9bb8cb07a1be2cd5df3a528dfbe7b980b70c22d4

  • SHA512

    186c6fe987769e211524343eb6b3b405d088ebe44b31e9f2c5282faabb7b1bb549bc7a0219c313ec05a6ee118e323ddab574bc73528929c97c4d20dc829269f8

Malware Config

Extracted

Family

warzonerat

C2

37.120.210.211:22612

Targets

    • Target

      44ce9bbea2b67d562f6b2b7941dc55df7049621fe8ffde240686fb8b7bfd4354

    • Size

      23KB

    • MD5

      e7a25f77d121b2a3821c3d8b0c47060c

    • SHA1

      d4e3bc63059fca99a3f945195488569cfdb6d816

    • SHA256

      44ce9bbea2b67d562f6b2b7941dc55df7049621fe8ffde240686fb8b7bfd4354

    • SHA512

      04e567a102106494abb21ba60b65dae52d65c1b13776aa0f1517b9337591a14895a72a8d924d229c3bff76a57f7a34e883d7f7ce42bab431ba4ba1245eb6dbc1

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • AgentTesla Payload

    • Looks for VirtualBox Guest Additions in registry

    • Warzone RAT Payload

    • Downloads MZ/PE file

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks