General

  • Target

    0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c

  • Size

    1.8MB

  • Sample

    220516-p81mfsceb5

  • MD5

    4e7eb50a75f8bf74751576cdd5381809

  • SHA1

    7e0dfbdd505b9451513b828e4d392e164fe566e9

  • SHA256

    0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c

  • SHA512

    05b9ae0aef714798034ac0c271f5a1ef44221e9b56480f6de3e07d9e94e438bd0ba11ef44c6ff48267d0d9a94ec18355641c67d744d51326c8c7569048b660f3

Malware Config

Extracted

Family

warzonerat

C2

hive01.duckdns.org:8584

Targets

    • Target

      0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c

    • Size

      1.8MB

    • MD5

      4e7eb50a75f8bf74751576cdd5381809

    • SHA1

      7e0dfbdd505b9451513b828e4d392e164fe566e9

    • SHA256

      0976a3ad891a358ff61b4e77d77ce4021cdcd53456a0ba21700b92ecd37ac37c

    • SHA512

      05b9ae0aef714798034ac0c271f5a1ef44221e9b56480f6de3e07d9e94e438bd0ba11ef44c6ff48267d0d9a94ec18355641c67d744d51326c8c7569048b660f3

    • HiveRAT

      HiveRAT is an improved version of FirebirdRAT with various capabilities.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • HiveRAT Payload

    • Warzone RAT Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks