General

  • Target

    TAX INVOICE_CCU-30408495_00942998_20180910_194739.scr

  • Size

    1.0MB

  • Sample

    210907-tkk93sgbcp

  • MD5

    3ea00473aa7a45027cfc9d3b1308abf9

  • SHA1

    c367952f2d5a08291ae5c6b7616ac0697158a8f7

  • SHA256

    0fa56bc51fcfede510b2169e525b30e8e4e978793b1e347f5b05fa5756af2255

  • SHA512

    27444454425a53eb10ecb29299506d6cc750749bee7becd25afc2ccb3f9265d14c73e5b12483de8bdf5c83af13c6a7abab0d7c6ef00dcf8255e3b7d24e6096bc

Malware Config

Extracted

Family

warzonerat

C2

warzonepw.ddns.net:6476

Targets

    • Target

      TAX INVOICE_CCU-30408495_00942998_20180910_194739.scr

    • Size

      1.0MB

    • MD5

      3ea00473aa7a45027cfc9d3b1308abf9

    • SHA1

      c367952f2d5a08291ae5c6b7616ac0697158a8f7

    • SHA256

      0fa56bc51fcfede510b2169e525b30e8e4e978793b1e347f5b05fa5756af2255

    • SHA512

      27444454425a53eb10ecb29299506d6cc750749bee7becd25afc2ccb3f9265d14c73e5b12483de8bdf5c83af13c6a7abab0d7c6ef00dcf8255e3b7d24e6096bc

    • Modifies WinLogon for persistence

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks