General

  • Target

    DLT TEMPLATE.COM

  • Size

    393KB

  • Sample

    220207-gcrexagbd8

  • MD5

    37939894527229498b818d7b5af7f178

  • SHA1

    9f38a4b61ec79233f5868cb945612761e100a4e7

  • SHA256

    f2b52783d75599508c49a1e7be95a2c7326eb16ae89252540f7c049206dae166

  • SHA512

    55a637ba2917a07efe651d088c335f37ec70a13023d4a655312b0a3748e2cd62235a5022cbba232918de184e5527da7cc20106ebdf41db498d8ad169a2378ce5

Malware Config

Extracted

Family

warzonerat

C2

iphanyi.webredirect.org:5552

Targets

    • Target

      DLT TEMPLATE.COM

    • Size

      393KB

    • MD5

      37939894527229498b818d7b5af7f178

    • SHA1

      9f38a4b61ec79233f5868cb945612761e100a4e7

    • SHA256

      f2b52783d75599508c49a1e7be95a2c7326eb16ae89252540f7c049206dae166

    • SHA512

      55a637ba2917a07efe651d088c335f37ec70a13023d4a655312b0a3748e2cd62235a5022cbba232918de184e5527da7cc20106ebdf41db498d8ad169a2378ce5

    • Modifies WinLogon for persistence

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT Payload

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

2
T1004

Registry Run Keys / Startup Folder

2
T1060

Defense Evasion

Modify Registry

4
T1112

Tasks