General

  • Target

    T31597760-Confirm-20210520-100016-Email-1574401.exe

  • Size

    1006KB

  • Sample

    210521-pe5lsmj8vn

  • MD5

    8addb03660ac849d116990b2c3f4bad8

  • SHA1

    f47dc617f55d4f8e7a06cc729b08ed1a5f2f518e

  • SHA256

    c5d7cbbe95c1ee46f8e76cd859295e56376a2b8985c2f50355e50fd966f05cd4

  • SHA512

    9a676bd4abe764dd774de5b678333af00211a7a0e7266054368697f35cb48a6df377f7d40eb1edc92a6e937028d9241ee29a40f4dd7a40fddebffe1811b5e93a

Malware Config

Extracted

Family

warzonerat

C2

157.55.136.23:5300

Targets

    • Target

      T31597760-Confirm-20210520-100016-Email-1574401.exe

    • Size

      1006KB

    • MD5

      8addb03660ac849d116990b2c3f4bad8

    • SHA1

      f47dc617f55d4f8e7a06cc729b08ed1a5f2f518e

    • SHA256

      c5d7cbbe95c1ee46f8e76cd859295e56376a2b8985c2f50355e50fd966f05cd4

    • SHA512

      9a676bd4abe764dd774de5b678333af00211a7a0e7266054368697f35cb48a6df377f7d40eb1edc92a6e937028d9241ee29a40f4dd7a40fddebffe1811b5e93a

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks