General

  • Target

    Order.exe

  • Size

    315KB

  • Sample

    210629-ac5s714fcx

  • MD5

    78033d4e72e5dc0be2eedaec4e95627a

  • SHA1

    87e25f605fc8c4c15bf6da42602cb69c4d9cd77e

  • SHA256

    0823e54b076d1359145b0060fe0d0f80b73220ddec8cc23d4901bd1e448e6ad6

  • SHA512

    b36096f52f5968fc0680f5bb3037c031751b30180b2d6aaa0f9ae5b9feeb9fb2b1e1940f1dc94482d2828d7d9105768d9235875944bc5aea2c687a05dee0e347

Malware Config

Extracted

Family

warzonerat

C2

sungito.zklg.net:4020

Targets

    • Target

      Order.exe

    • Size

      315KB

    • MD5

      78033d4e72e5dc0be2eedaec4e95627a

    • SHA1

      87e25f605fc8c4c15bf6da42602cb69c4d9cd77e

    • SHA256

      0823e54b076d1359145b0060fe0d0f80b73220ddec8cc23d4901bd1e448e6ad6

    • SHA512

      b36096f52f5968fc0680f5bb3037c031751b30180b2d6aaa0f9ae5b9feeb9fb2b1e1940f1dc94482d2828d7d9105768d9235875944bc5aea2c687a05dee0e347

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks