General

  • Target

    RFQ2022-7-5F3435.exe

  • Size

    135KB

  • Sample

    220705-n7fp8aagf5

  • MD5

    583fd649413705044c36439ffa27afe0

  • SHA1

    37ccdfbf77338199a059840827a0a0bfb31cc095

  • SHA256

    39169117bfbe15a6b58f91a5dd98809ba251cef0f103656ba9d2168baf9052e2

  • SHA512

    4bb4dd3ea197fa2dcfe153fe83b21141989fd90d6b377c480e4229540f079722ec5f32fb2549f527edc322400eaa2624e4ff5e40237b36472c11a28c771b1d30

Malware Config

Extracted

Family

warzonerat

C2

76.8.53.133:443

Targets

    • Target

      RFQ2022-7-5F3435.exe

    • Size

      135KB

    • MD5

      583fd649413705044c36439ffa27afe0

    • SHA1

      37ccdfbf77338199a059840827a0a0bfb31cc095

    • SHA256

      39169117bfbe15a6b58f91a5dd98809ba251cef0f103656ba9d2168baf9052e2

    • SHA512

      4bb4dd3ea197fa2dcfe153fe83b21141989fd90d6b377c480e4229540f079722ec5f32fb2549f527edc322400eaa2624e4ff5e40237b36472c11a28c771b1d30

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger Payload

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Email Collection

1
T1114

Tasks