General

  • Target

    New Order.xls.exe

  • Size

    361KB

  • Sample

    211028-qx8z5abff9

  • MD5

    0f3af49aed9b20bc69abe9f3c5b36364

  • SHA1

    73e825d30b8666d15b5d229e8a1f96c435bd8f9f

  • SHA256

    396cf03c5637b57c3b391d5bb7b8c05fce62d23ee9df51f99669268c5be28742

  • SHA512

    c70e515a227571eede0072316ce28180c8883c27ea469b6fb04101253b6e1b4a6e0ffb155c87a7a869f7aedeec7240ec1416f5f5b419612117e9ff7bba9f8274

Malware Config

Extracted

Family

warzonerat

C2

alliedofficewarz.ddns.net:6060

Targets

    • Target

      New Order.xls.exe

    • Size

      361KB

    • MD5

      0f3af49aed9b20bc69abe9f3c5b36364

    • SHA1

      73e825d30b8666d15b5d229e8a1f96c435bd8f9f

    • SHA256

      396cf03c5637b57c3b391d5bb7b8c05fce62d23ee9df51f99669268c5be28742

    • SHA512

      c70e515a227571eede0072316ce28180c8883c27ea469b6fb04101253b6e1b4a6e0ffb155c87a7a869f7aedeec7240ec1416f5f5b419612117e9ff7bba9f8274

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks