General

  • Target

    759e32f34453405da59c9d75f8e2f544

  • Size

    893KB

  • Sample

    210915-hptlgadagq

  • MD5

    759e32f34453405da59c9d75f8e2f544

  • SHA1

    b5d265cd3d7203b46609b525762ebb40a503ae1b

  • SHA256

    1315fb9110a9b6bcf1326af2be8438b1d47bc4b46815db1ab49bed4fa58b3f51

  • SHA512

    7efbf142bc58a2e301fd7a8a9c3c27cee37b88f47a8269f311b616c15209272f57928ebcb6b2acbd6bdc79183d5ec8cd9138f4be0a3db5b69603f2645c82c2ed

Malware Config

Extracted

Family

warzonerat

C2

severdops.ddns.net:3311

Targets

    • Target

      759e32f34453405da59c9d75f8e2f544

    • Size

      893KB

    • MD5

      759e32f34453405da59c9d75f8e2f544

    • SHA1

      b5d265cd3d7203b46609b525762ebb40a503ae1b

    • SHA256

      1315fb9110a9b6bcf1326af2be8438b1d47bc4b46815db1ab49bed4fa58b3f51

    • SHA512

      7efbf142bc58a2e301fd7a8a9c3c27cee37b88f47a8269f311b616c15209272f57928ebcb6b2acbd6bdc79183d5ec8cd9138f4be0a3db5b69603f2645c82c2ed

    • Modifies Windows Defender Real-time Protection settings

    • Turns off Windows Defender SpyNet reporting

    • UAC bypass

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Windows security bypass

    • Looks for VirtualBox Guest Additions in registry

    • Nirsoft

    • Executes dropped EXE

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Drops startup file

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Modify Registry

7
T1112

Disabling Security Tools

5
T1089

Bypass User Account Control

1
T1088

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks