General

  • Target

    DHL Receipt Document.exe

  • Size

    1.2MB

  • Sample

    220405-sklp6sceck

  • MD5

    fbdfab37fbd0f2a74ba0efd0cd0bb5eb

  • SHA1

    5f7122630d83ad50f15b1774221a55441cf8b76c

  • SHA256

    38d6bfa22e0921e6d7bc625f64ef700d87bdf7d00cf4896c4f39e86cb2731ccc

  • SHA512

    992429697e66dfb05374114f4537bc4ecede5e49bc79d78372e82bcf1d1bf220ba43bc7722ff01c89ed8c9d06107c32f33f10d02ce7e24c4700a67297f7bea82

Malware Config

Extracted

Family

warzonerat

C2

grace2nation.ddns.net:8657

Targets

    • Target

      DHL Receipt Document.exe

    • Size

      1.2MB

    • MD5

      fbdfab37fbd0f2a74ba0efd0cd0bb5eb

    • SHA1

      5f7122630d83ad50f15b1774221a55441cf8b76c

    • SHA256

      38d6bfa22e0921e6d7bc625f64ef700d87bdf7d00cf4896c4f39e86cb2731ccc

    • SHA512

      992429697e66dfb05374114f4537bc4ecede5e49bc79d78372e82bcf1d1bf220ba43bc7722ff01c89ed8c9d06107c32f33f10d02ce7e24c4700a67297f7bea82

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Looks for VirtualBox Guest Additions in registry

    • Warzone RAT Payload

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

2
T1082

Peripheral Device Discovery

1
T1120

Tasks