General

  • Target

    zone.exe

  • Size

    113KB

  • Sample

    220117-v9n8psbhfk

  • MD5

    ebe5ca92984aae9e67e3dc5ec722152b

  • SHA1

    1a239d15040f596bfdf35302406f3d387051fdc3

  • SHA256

    8c712536d879974c429be225293d35c86f852167a05b58e82ef9ae1b5133c6d9

  • SHA512

    0e910bc536ad3c73effab71b29116499c88a64f7df553eebeaa3c82dde2be20cf084ccc81a5ce9e81ef5e594cc92c02b55b14df5677e3a6967853e4945d3abf5

Malware Config

Extracted

Family

warzonerat

C2

rtyui.nerdpol.ovh:5200

Targets

    • Target

      zone.exe

    • Size

      113KB

    • MD5

      ebe5ca92984aae9e67e3dc5ec722152b

    • SHA1

      1a239d15040f596bfdf35302406f3d387051fdc3

    • SHA256

      8c712536d879974c429be225293d35c86f852167a05b58e82ef9ae1b5133c6d9

    • SHA512

      0e910bc536ad3c73effab71b29116499c88a64f7df553eebeaa3c82dde2be20cf084ccc81a5ce9e81ef5e594cc92c02b55b14df5677e3a6967853e4945d3abf5

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks