General

  • Target

    text.exe

  • Size

    1.1MB

  • Sample

    210723-94dsyzav2n

  • MD5

    08e321e2f7a4fceebed7d9330c7e627b

  • SHA1

    2049c1f290d542fba9690958d97c25c0f9d2b39d

  • SHA256

    670a52daaf17c5925d5cb33c03e849a863f11f153d438519ec3c71083a90167b

  • SHA512

    f3ed6cf7f15f65878d547be2853376602236d4364f6d53566b8169fc05b26454c031f3b7b5630c5dd340054fdca81fe69f569aad9b1cc06cdef751f7eac3d1f1

Malware Config

Extracted

Family

warzonerat

C2

5.226.138.94:6621

Targets

    • Target

      text.exe

    • Size

      1.1MB

    • MD5

      08e321e2f7a4fceebed7d9330c7e627b

    • SHA1

      2049c1f290d542fba9690958d97c25c0f9d2b39d

    • SHA256

      670a52daaf17c5925d5cb33c03e849a863f11f153d438519ec3c71083a90167b

    • SHA512

      f3ed6cf7f15f65878d547be2853376602236d4364f6d53566b8169fc05b26454c031f3b7b5630c5dd340054fdca81fe69f569aad9b1cc06cdef751f7eac3d1f1

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks