General

  • Target

    FAKTURA.exe

  • Size

    81KB

  • Sample

    221003-le461ahdbk

  • MD5

    190fc47ddc0eac2738f89a6878bc73ad

  • SHA1

    7ad43030bcadc2a6a1205522252fa33f6ed22dff

  • SHA256

    50757b77a949ddcf92e70cb861329bfe1657d5c25f1d287756a5eb181fc127d4

  • SHA512

    a66038ab681ac1a0cc795c102d39e1f5799c1c506f7dea948a0079e2c6fbce1590ce78782e209acc836dae1744ac985e494ff11280f2f04304ba6732fb5c2d7a

  • SSDEEP

    1536:rqBz4UVUa/CIRV5hcCSJ+rWqIDJ9zJJQUvJPO:rqB4Ba/CGuCSJ+rWqIDDJi6s

Malware Config

Extracted

Family

warzonerat

C2

ekuroekuro.duckdns.org:5200

Targets

    • Target

      FAKTURA.exe

    • Size

      81KB

    • MD5

      190fc47ddc0eac2738f89a6878bc73ad

    • SHA1

      7ad43030bcadc2a6a1205522252fa33f6ed22dff

    • SHA256

      50757b77a949ddcf92e70cb861329bfe1657d5c25f1d287756a5eb181fc127d4

    • SHA512

      a66038ab681ac1a0cc795c102d39e1f5799c1c506f7dea948a0079e2c6fbce1590ce78782e209acc836dae1744ac985e494ff11280f2f04304ba6732fb5c2d7a

    • SSDEEP

      1536:rqBz4UVUa/CIRV5hcCSJ+rWqIDJ9zJJQUvJPO:rqB4Ba/CGuCSJ+rWqIDDJi6s

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Drops startup file

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks