General

  • Target

    New Order.xls.zip

  • Size

    280KB

  • Sample

    211029-bjc8zahbdn

  • MD5

    519df375cb456f4d1b5a7d761962118c

  • SHA1

    b6ac4472f4aaaf6245c926f4e229e4f59e991c7e

  • SHA256

    5ccbcf93826727e9d64a62dd340637db6ca1b212362cabd24cc9ef87403f567f

  • SHA512

    66435a8e66e26b6f85a3a81947bbb5a196ce4582cd4e944f24eeb79259b0590308c2c95ebfe77bdf8734373de394d44747acff47ce3a3036ef5bc108da9222ec

Malware Config

Extracted

Family

warzonerat

C2

alliedofficewarz.ddns.net:6060

Targets

    • Target

      New Order.xls.exe

    • Size

      361KB

    • MD5

      0f3af49aed9b20bc69abe9f3c5b36364

    • SHA1

      73e825d30b8666d15b5d229e8a1f96c435bd8f9f

    • SHA256

      396cf03c5637b57c3b391d5bb7b8c05fce62d23ee9df51f99669268c5be28742

    • SHA512

      c70e515a227571eede0072316ce28180c8883c27ea469b6fb04101253b6e1b4a6e0ffb155c87a7a869f7aedeec7240ec1416f5f5b419612117e9ff7bba9f8274

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks