General

  • Target

    afc7b9f38b2648bb4e055cbce875621342886e333dfa4893f9742ee93f856292.exe

  • Size

    857KB

  • Sample

    221010-mtd4ssbffq

  • MD5

    32d9f3391e5d4cf3cd560968f3cd87ec

  • SHA1

    72641c9eaf2a11a1230151ca6863976640a61060

  • SHA256

    afc7b9f38b2648bb4e055cbce875621342886e333dfa4893f9742ee93f856292

  • SHA512

    ef0f5435a76b30bc6d858d73d3a5c6a28dc9afe2b935e3f42a69f5ff12c35101c0e8d919886bdf0e097875d99d203e8b9eb1527cca973495efc24d9d55a8bd1d

  • SSDEEP

    12288:UGQz9BMdQ94WdcjXF02YB9rP6fyvC5Vfs4jFt4xVBT5WjDUc6pbZe:vM9IDJ02emfyvCTXjUveQPpbZe

Malware Config

Extracted

Family

warzonerat

C2

20.126.95.155:7800

Targets

    • Target

      afc7b9f38b2648bb4e055cbce875621342886e333dfa4893f9742ee93f856292.exe

    • Size

      857KB

    • MD5

      32d9f3391e5d4cf3cd560968f3cd87ec

    • SHA1

      72641c9eaf2a11a1230151ca6863976640a61060

    • SHA256

      afc7b9f38b2648bb4e055cbce875621342886e333dfa4893f9742ee93f856292

    • SHA512

      ef0f5435a76b30bc6d858d73d3a5c6a28dc9afe2b935e3f42a69f5ff12c35101c0e8d919886bdf0e097875d99d203e8b9eb1527cca973495efc24d9d55a8bd1d

    • SSDEEP

      12288:UGQz9BMdQ94WdcjXF02YB9rP6fyvC5Vfs4jFt4xVBT5WjDUc6pbZe:vM9IDJ02emfyvCTXjUveQPpbZe

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • ModiLoader Second Stage

    • Warzone RAT payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Remote System Discovery

1
T1018

Tasks