General

  • Target

    Copia de pago.exe

  • Size

    1.7MB

  • Sample

    210614-j16tl4bj3j

  • MD5

    b62f2ebe902cfe1cebb85b269f168637

  • SHA1

    a11ffcc5ce46c65b8c79a02d9bdcae67f7d250b5

  • SHA256

    5470a74090fda229660d99b498602172d806fee8a15ed77887788eb63f0ea785

  • SHA512

    45c9b6e32c1a343d3f2c610d48e0f1c439d512806932c90a3e6800502dc9f941b2c5adf51a53a965c60ef5783913c6b036fa14b8e4be5a2509c493e9c7f2641f

Malware Config

Extracted

Family

warzonerat

C2

79.134.225.50:5751

Targets

    • Target

      Copia de pago.exe

    • Size

      1.7MB

    • MD5

      b62f2ebe902cfe1cebb85b269f168637

    • SHA1

      a11ffcc5ce46c65b8c79a02d9bdcae67f7d250b5

    • SHA256

      5470a74090fda229660d99b498602172d806fee8a15ed77887788eb63f0ea785

    • SHA512

      45c9b6e32c1a343d3f2c610d48e0f1c439d512806932c90a3e6800502dc9f941b2c5adf51a53a965c60ef5783913c6b036fa14b8e4be5a2509c493e9c7f2641f

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks