General

  • Target

    file.exe

  • Size

    141KB

  • Sample

    210630-yx1rg9at3s

  • MD5

    74708b96618bd93dfadf391c9a2cf610

  • SHA1

    04c0161058cbd959037d513b4b4165228c8a9f3a

  • SHA256

    7104a4df53b683b1a99c9767c743a53d3ffe200f31279ee3d31f1514fb5fa95e

  • SHA512

    7ab7db9e203a04256833fbabce10df706fb3c7e80f8b4b6b0b120b23c2deb8fa81b409b111786bcc262219d82e0fd78a2860bbd890fb9d3137bcc74484edd25c

Malware Config

Extracted

Family

warzonerat

C2

185.157.160.215:2211

Targets

    • Target

      file.exe

    • Size

      141KB

    • MD5

      74708b96618bd93dfadf391c9a2cf610

    • SHA1

      04c0161058cbd959037d513b4b4165228c8a9f3a

    • SHA256

      7104a4df53b683b1a99c9767c743a53d3ffe200f31279ee3d31f1514fb5fa95e

    • SHA512

      7ab7db9e203a04256833fbabce10df706fb3c7e80f8b4b6b0b120b23c2deb8fa81b409b111786bcc262219d82e0fd78a2860bbd890fb9d3137bcc74484edd25c

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks