General

  • Target

    6.exe

  • Size

    3.1MB

  • Sample

    210521-7dycarcwts

  • MD5

    341aac609408d648208af28175524839

  • SHA1

    7d573d721f569056258ac491e09c0b0faa0839e9

  • SHA256

    e6423c68a7adf96f2bdeeafeb94f9891b6c05bac83e6df0695ebbdf37e01fb15

  • SHA512

    2dae6ed8c479358b04248f4d4f0d61f234601e2ca9d1434be82bae339e8080138a92381d05e2e7454afa20d85192091920bd39693c0a440a5a9cc4986b2a67cb

Malware Config

Extracted

Family

warzonerat

C2

192.30.241.52:3830

Targets

    • Target

      6.exe

    • Size

      3.1MB

    • MD5

      341aac609408d648208af28175524839

    • SHA1

      7d573d721f569056258ac491e09c0b0faa0839e9

    • SHA256

      e6423c68a7adf96f2bdeeafeb94f9891b6c05bac83e6df0695ebbdf37e01fb15

    • SHA512

      2dae6ed8c479358b04248f4d4f0d61f234601e2ca9d1434be82bae339e8080138a92381d05e2e7454afa20d85192091920bd39693c0a440a5a9cc4986b2a67cb

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks