General

  • Target

    RFQ-8372929.IMG

  • Size

    1.2MB

  • Sample

    210707-r85a5tzqze

  • MD5

    a39409e3ecb4aec40f1e4fe18fbf09f2

  • SHA1

    b6f3345891be51832a51347d9c290471ee2571df

  • SHA256

    cb580eb33d7e00603fd65b594847041850369a88e6a6982e4dba9a514e8d3662

  • SHA512

    1291eb1bcf9f35632c274a252a111740295db1b3cc330b81856804ee82069ef2df6707038b756b7d80487d08c8d51d5641353833722d16e4b88969cc0b791fc1

Malware Config

Extracted

Family

warzonerat

C2

blacice24.hopto.org:5032

Targets

    • Target

      RFQ_8372.EXE

    • Size

      268KB

    • MD5

      a90ed1f4f7f3f78305e7de97d695558b

    • SHA1

      c86ba7ddfbe6807d67a013f6a3ac9d5e794aff6b

    • SHA256

      b3f62f715739b275634201649f33800caca201a2c6c32b1f424f2e312006ead0

    • SHA512

      7eeedc19ee89791f17adc24390edbc79635a0145240d6b5e076493760886e3622929604b73db992b1093da00b4d39e252df149fd01cb6a0ef0a81dc9e863156f

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks