General

  • Target

    Oyqpjkectdtied.exe

  • Size

    730KB

  • Sample

    221101-zntcrafgfp

  • MD5

    3792db21c47b73406757ef3e6f6f02fb

  • SHA1

    4f640e00c72d15f6585f6b5bda0e9a6b3c7a6be1

  • SHA256

    4cf4313d499e9400a60a0961344e6df29acc85e6d62e18c118bef1493f801e53

  • SHA512

    9a99d08bbf2d2eb38b7f661240284b69c946215820b4c3759b8f4b779248f516c65b3ea0d8c71b071798321834253095e6064388f9096d399ef7ee53fe9fdf05

  • SSDEEP

    12288:cmkj8E72nMvEp9K8jfCRxsvUTGifrMReP0+ax+6m23m23msffffffffffffffffz:uAECSEp9ljfCmUTvfYRB+ax+6m23m23R

Malware Config

Extracted

Family

warzonerat

C2

samguys2.duckdns.org:1430

Targets

    • Target

      Oyqpjkectdtied.exe

    • Size

      730KB

    • MD5

      3792db21c47b73406757ef3e6f6f02fb

    • SHA1

      4f640e00c72d15f6585f6b5bda0e9a6b3c7a6be1

    • SHA256

      4cf4313d499e9400a60a0961344e6df29acc85e6d62e18c118bef1493f801e53

    • SHA512

      9a99d08bbf2d2eb38b7f661240284b69c946215820b4c3759b8f4b779248f516c65b3ea0d8c71b071798321834253095e6064388f9096d399ef7ee53fe9fdf05

    • SSDEEP

      12288:cmkj8E72nMvEp9K8jfCRxsvUTGifrMReP0+ax+6m23m23msffffffffffffffffz:uAECSEp9ljfCmUTvfYRB+ax+6m23m23R

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • ModiLoader Second Stage

    • Warzone RAT payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks