General

  • Target

    Quotation-Request.zip

  • Size

    169KB

  • Sample

    210712-jk4cn3l6x2

  • MD5

    672d097a62a05e02e3cc7aae6bdf7954

  • SHA1

    53814d596056e4e276d0d5aa2fb3e88202d29e1e

  • SHA256

    a6c0b5ffc572e8892a3a140b82a956374c5a7d0670244c0f63a7c201f050cce5

  • SHA512

    c641cf3ace48c165091c57385194c59cc6d32b3cc5db720ee1cfa4abe9188148f255755f49f0f9d28a946f9d26544cd889e60e6e28f22299030feb950b305209

Malware Config

Extracted

Family

warzonerat

C2

blacice24.hopto.org:5032

Targets

    • Target

      Quotation-Request.exe

    • Size

      282KB

    • MD5

      4e3cfd2f0ab3148901ba7e33a1ba8ee3

    • SHA1

      324c353ceb28f6134333e9b794cb0b8e03e9a1e6

    • SHA256

      a3eb95be23a44e65540fda0d8b3114f98be79d63818cb42ef9472cafaa24e472

    • SHA512

      6f40d01c1eb1276075baf4cafcb7234992a2a4d9fa7b0b7787d8676bcd5c93736b36c9c77a145c721886fd75ccd65e862f0c3d2eba00641e9837f134ca22cef8

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks