General

  • Target

    EMTECH IPH GROUP.exe

  • Size

    62KB

  • Sample

    210720-rhhq97x1rj

  • MD5

    4b3470167aed6f5cba3103b3abaaa7c4

  • SHA1

    6282b6635b89c19086e7e77aa508aa3f484b3e6e

  • SHA256

    caf865d460e97d3f1043fdade9be954436bb158f6101d3598d1334acfef400d3

  • SHA512

    8dd0e0ec717afd64255c47424682d642b670d4c8d75deb169a9b433807d23651e79e94b7f78f8d954c19abd99aa332204c2f86df6af98928d2d8b0f0de3e6a8d

Malware Config

Extracted

Family

warzonerat

C2

185.157.160.215:2211

Targets

    • Target

      EMTECH IPH GROUP.exe

    • Size

      62KB

    • MD5

      4b3470167aed6f5cba3103b3abaaa7c4

    • SHA1

      6282b6635b89c19086e7e77aa508aa3f484b3e6e

    • SHA256

      caf865d460e97d3f1043fdade9be954436bb158f6101d3598d1334acfef400d3

    • SHA512

      8dd0e0ec717afd64255c47424682d642b670d4c8d75deb169a9b433807d23651e79e94b7f78f8d954c19abd99aa332204c2f86df6af98928d2d8b0f0de3e6a8d

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks