General

  • Target

    DHL_Jul 2021 at 1.70_3BZ290_PDF.exe

  • Size

    796KB

  • Sample

    210713-f41ybj3t8e

  • MD5

    46ce1867ca55f06b6ff84e654822e082

  • SHA1

    ce5e6eabeeb9fa2ded224013e115f7abbfbc60d4

  • SHA256

    acf32ff7188603f606595a6609981a97cabdb0c716e9bae65aed3af301f21b35

  • SHA512

    14da6bd56599409d17255fc51326ffdd11ca0679e5125d6dbd7fdb682abac90de3b08e2dc4ee79a8935e2eff20dbad2c27bee24484c47581d26968e5bae725b6

Malware Config

Extracted

Family

warzonerat

C2

103.133.109.176:7600

Targets

    • Target

      DHL_Jul 2021 at 1.70_3BZ290_PDF.exe

    • Size

      796KB

    • MD5

      46ce1867ca55f06b6ff84e654822e082

    • SHA1

      ce5e6eabeeb9fa2ded224013e115f7abbfbc60d4

    • SHA256

      acf32ff7188603f606595a6609981a97cabdb0c716e9bae65aed3af301f21b35

    • SHA512

      14da6bd56599409d17255fc51326ffdd11ca0679e5125d6dbd7fdb682abac90de3b08e2dc4ee79a8935e2eff20dbad2c27bee24484c47581d26968e5bae725b6

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks