General

  • Target

    Booking.lnk

  • Size

    1KB

  • Sample

    210717-e289tcgvkj

  • MD5

    c19da592366d6c173dee901add093e8e

  • SHA1

    ddd038c49bee36557cd203b581948e98a5e787a1

  • SHA256

    ab915bb1e45aba4cbbb762e4bac31510539b4a418d8466839bf6e4c1b40b87a2

  • SHA512

    7d9c0d3aa4b8907598f3c0982b32cc35d9afb816de8e350aefac3993cfbcd0e2b3c84ce59d99b9de239b20a10179ea6db9370aa53c89b3c3a1e4c05db8bdd7b3

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://ia801509.us.archive.org/29/items/enc-kkkkkkkkkkkooooooookkkkkkkkkkk-2435467568790/Enc_kkkkkkkkkkkooooooookkkkkkkkkkk_2435467568790.txt

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://ia601504.us.archive.org/1/items/all-kkkkkkkkkkkkooooooooookkkkkkkkkkkkkkk/ALL_kkkkkkkkkkkkooooooooookkkkkkkkkkkkkkk.txt

Extracted

Family

warzonerat

C2

103.147.184.73:5719

Targets

    • Target

      Booking.lnk

    • Size

      1KB

    • MD5

      c19da592366d6c173dee901add093e8e

    • SHA1

      ddd038c49bee36557cd203b581948e98a5e787a1

    • SHA256

      ab915bb1e45aba4cbbb762e4bac31510539b4a418d8466839bf6e4c1b40b87a2

    • SHA512

      7d9c0d3aa4b8907598f3c0982b32cc35d9afb816de8e350aefac3993cfbcd0e2b3c84ce59d99b9de239b20a10179ea6db9370aa53c89b3c3a1e4c05db8bdd7b3

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Blocklisted process makes network request

    • Sets DLL path for service in the registry

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Tasks