General

  • Target

    Purchase Order.exe

  • Size

    406KB

  • Sample

    210715-z9yc8hq6an

  • MD5

    e6c4b3b21396e6dd650f9dd43aea0c5e

  • SHA1

    3551fdfd1e6a4d657349b61d369f81aed7a84b2d

  • SHA256

    e82c6834c7a9fb7ffa1d5b5ccafe0b2a97a4ff30bfe5e770e26f6b1232e5b672

  • SHA512

    86642b21cddd76be5bb6800f7dc24e13d21674925964b1c038111ea17d58411027556409fa6b308192ac456e33f96467c53c4990402ed4eaea25af44ce3decc9

Malware Config

Extracted

Family

warzonerat

C2

dar123.hopto.org:5032

Targets

    • Target

      Purchase Order.exe

    • Size

      406KB

    • MD5

      e6c4b3b21396e6dd650f9dd43aea0c5e

    • SHA1

      3551fdfd1e6a4d657349b61d369f81aed7a84b2d

    • SHA256

      e82c6834c7a9fb7ffa1d5b5ccafe0b2a97a4ff30bfe5e770e26f6b1232e5b672

    • SHA512

      86642b21cddd76be5bb6800f7dc24e13d21674925964b1c038111ea17d58411027556409fa6b308192ac456e33f96467c53c4990402ed4eaea25af44ce3decc9

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks