General

  • Target

    bnUeC95F41kCZTTTu_cm-nwOnIwqjv-139OZEsTrG34.bin

  • Size

    1.0MB

  • Sample

    210726-39p33911cs

  • MD5

    b8b67c16029de86734bc326cc8ee10bc

  • SHA1

    5ad452ed075d370508aa699c82f650b9e97fc7be

  • SHA256

    6e751e0bde45e359026534d3bbe726fe7c0e9c8c2a8efff5dfd39912c4eb1b7e

  • SHA512

    e0a35000f7978e5f1faab42f2e10109546f99c0146e4c252f4080819bef0f523e95051a853dfce1d6fc1eeb5e55ca6ce7a84f665c84630e8c5bfc19809b97d4c

Malware Config

Extracted

Family

warzonerat

C2

185.222.57.73:4557

Targets

    • Target

      bnUeC95F41kCZTTTu_cm-nwOnIwqjv-139OZEsTrG34.bin

    • Size

      1.0MB

    • MD5

      b8b67c16029de86734bc326cc8ee10bc

    • SHA1

      5ad452ed075d370508aa699c82f650b9e97fc7be

    • SHA256

      6e751e0bde45e359026534d3bbe726fe7c0e9c8c2a8efff5dfd39912c4eb1b7e

    • SHA512

      e0a35000f7978e5f1faab42f2e10109546f99c0146e4c252f4080819bef0f523e95051a853dfce1d6fc1eeb5e55ca6ce7a84f665c84630e8c5bfc19809b97d4c

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • suricata: ET MALWARE Possible Malicious Macro DL EXE Feb 2016

    • Warzone RAT Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks