General

  • Target

    CamScanner_PO#22070_Ref_389462,PO#22088_Ref_80411927.exe

  • Size

    910KB

  • Sample

    210724-8dkdw1dp8e

  • MD5

    1318f9fe79e0c1d31ef1a04cbc5a3078

  • SHA1

    5096e7707c3470d02e29d49777a9c892d4a84c0c

  • SHA256

    63cd6fa89880cc5dadc8995b2ec904afe0cb3685c65c80569ce0d0942b14e4ad

  • SHA512

    3d3c411b4a74009ecedd2f947d233590294aa2b9dc4974accf6afbd01723988c4f14f115b2289599ba0df98d61450cc3ea74c570747ef2227a8631c2e64e1ff8

Malware Config

Extracted

Family

warzonerat

C2

xchilogs.duckdns.org:23411

Targets

    • Target

      CamScanner_PO#22070_Ref_389462,PO#22088_Ref_80411927.exe

    • Size

      910KB

    • MD5

      1318f9fe79e0c1d31ef1a04cbc5a3078

    • SHA1

      5096e7707c3470d02e29d49777a9c892d4a84c0c

    • SHA256

      63cd6fa89880cc5dadc8995b2ec904afe0cb3685c65c80569ce0d0942b14e4ad

    • SHA512

      3d3c411b4a74009ecedd2f947d233590294aa2b9dc4974accf6afbd01723988c4f14f115b2289599ba0df98d61450cc3ea74c570747ef2227a8631c2e64e1ff8

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Tasks