General

  • Target

    9cd417da68471226ae74dfdcb89a506d591b50561be9f596f894178adc0d366e

  • Size

    357KB

  • Sample

    220521-cxh7tahfhn

  • MD5

    51c45fd730a27394da19cfe296e6cb3b

  • SHA1

    db5227839f3eacff1209b2cafff3a99e3f7af01a

  • SHA256

    9cd417da68471226ae74dfdcb89a506d591b50561be9f596f894178adc0d366e

  • SHA512

    e6300f02dae7c973eea079417958a9b1669eef7216e35d23badbb613756a59f101a449a03bd46924ba90355d20c5f294936b0c1a8f9e5eb857357a6420881b44

Malware Config

Extracted

Family

warzonerat

C2

divy.nerdpol.ovh:5200

Targets

    • Target

      New supplier Inquiry and PO 208202750_ DOC.exe

    • Size

      421KB

    • MD5

      c8cc1aa9f0824c83a98cf9072d0079cb

    • SHA1

      61c95c346b2c07d5a7ac2bb1d30745903a3ad99b

    • SHA256

      25bd8be2689477443c6a6b89c3195bd81b733853aa4502cfd14a6e25afc3798e

    • SHA512

      74e30df757e59db8f67a09fbaec4a47ccfe3cf9cb9ecc7244517e5e9a3b71373ea2dd3f8977490b3437a62c6b4f991d9053cf5a7492e34960a148486614443e3

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Looks for VirtualBox Guest Additions in registry

    • Warzone RAT Payload

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Virtualization/Sandbox Evasion

2
T1497

Discovery

Query Registry

5
T1012

Virtualization/Sandbox Evasion

2
T1497

System Information Discovery

4
T1082

Peripheral Device Discovery

1
T1120

Tasks