General

  • Target

    PO.90764535.slip.scan.xls...exe

  • Size

    453KB

  • Sample

    211028-tfnjmsgfcr

  • MD5

    3926a4ab9a485a9d28d2512f9a254199

  • SHA1

    ad11ac268f4a1caff23032b395f8b012254a280f

  • SHA256

    b1a9f22c87a2e4670e15e795aefd06567372e0faa568f355597aebb1b95e93ad

  • SHA512

    9634053efc61a9dd1fcceb06e24a467fec94167a12dc3840fc1d8a03c88eb83c31da1854840e8d08b6e22725209ac09a5cbebc611e604a49cd966fa4e1835093

Malware Config

Extracted

Family

warzonerat

C2

185.222.57.242:1004

Targets

    • Target

      PO.90764535.slip.scan.xls...exe

    • Size

      453KB

    • MD5

      3926a4ab9a485a9d28d2512f9a254199

    • SHA1

      ad11ac268f4a1caff23032b395f8b012254a280f

    • SHA256

      b1a9f22c87a2e4670e15e795aefd06567372e0faa568f355597aebb1b95e93ad

    • SHA512

      9634053efc61a9dd1fcceb06e24a467fec94167a12dc3840fc1d8a03c88eb83c31da1854840e8d08b6e22725209ac09a5cbebc611e604a49cd966fa4e1835093

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Tasks