General

  • Target

    80a4585a955dc377872e19eac82f8b92

  • Size

    761KB

  • Sample

    220914-nsh7ssdhar

  • MD5

    80a4585a955dc377872e19eac82f8b92

  • SHA1

    ff090858ed1ccb48b1edf35ac2119ca2ec6580be

  • SHA256

    b5a03025f7f14a83040a5aea0905ae1a2baaf132fe10cdc1483e6012adb75cb5

  • SHA512

    2e514e8c6de930a12227c27e1b2e1a887aaa435b1d2b0f5c047435e659915221da6cefde1d1bdbf98bad5ee1daa89b218b76c37d3c5433bf72691895cb679927

  • SSDEEP

    12288:yGf8Fr7pdba5e1Cw11P+0Nj6jxlFD84CegdBqhwjfDZ/OSMfAT6HvIH0ZbTHX:XExj112c6jPgdppOSE55ZbTHX

Malware Config

Extracted

Family

warzonerat

C2

171.22.30.72:5151

Targets

    • Target

      Uj bejelentkezEsi adatai·pdf.exe

    • Size

      864KB

    • MD5

      bb5eef6ab8be4b744a9d31e3e07f639a

    • SHA1

      f39a49aad31cc0188f985d789deefaa74329b993

    • SHA256

      21d09c77de01cc95209727752e866221ad3b66d5233ab52cfe5249a3867ef8d8

    • SHA512

      297fe7d56d770df96719e00bcb63294503c07507edd5ddafdec7f4f7866e6b41f93ab786575a899411b8633bbaee17f5f7c4efed175e2794ba05a8392e3b9445

    • SSDEEP

      6144:jswxmS3Prp/fcCNjhIJqUAhsbgDQ6qs3PrVeFJIeUSZkyuWGsQJjOE5De9jCCjL1:VxZPtZIEtcV0edmTZskDuVZQY

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Looks for VirtualBox Guest Additions in registry

    • Warzone RAT payload

    • Executes dropped EXE

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks