General

  • Target

    doc.exe

  • Size

    795KB

  • Sample

    210609-vy3mx8exbs

  • MD5

    6dcd993aa9adc6d1f14f0da54e8e7353

  • SHA1

    e3bde1a8dc7138e42d9047151a8901ddb4a1e113

  • SHA256

    82e883ad6e6fe8e8a480b574fffe77c18f449daa028673e42c0c74a9fd9a30e1

  • SHA512

    ca97de74082eeb012e6bde671d3a891371dd691ded049da3137b204cb4a036d25646f23142fe1560485de95d812ce4d8f3f243ceb0336e153c5b828f7bdfc08a

Malware Config

Extracted

Family

warzonerat

C2

157.55.136.23:5300

Targets

    • Target

      doc.exe

    • Size

      795KB

    • MD5

      6dcd993aa9adc6d1f14f0da54e8e7353

    • SHA1

      e3bde1a8dc7138e42d9047151a8901ddb4a1e113

    • SHA256

      82e883ad6e6fe8e8a480b574fffe77c18f449daa028673e42c0c74a9fd9a30e1

    • SHA512

      ca97de74082eeb012e6bde671d3a891371dd691ded049da3137b204cb4a036d25646f23142fe1560485de95d812ce4d8f3f243ceb0336e153c5b828f7bdfc08a

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks