General

  • Target

    http://198.12.110.183/vista/vbc.exe

  • Sample

    210629-nbh82c8ebj

Malware Config

Extracted

Family

warzonerat

C2

seencroundercontroller.webredirect.org:1894

Targets

    • Target

      http://198.12.110.183/vista/vbc.exe

    • Modifies system executable filetype association

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Uses the VBS compiler for execution

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks