General

  • Target

    Payment copy.exe

  • Size

    26KB

  • Sample

    221103-jx9hbsaddn

  • MD5

    ac8b8cdb5dbab70faced147a56718cc7

  • SHA1

    76bef62765559588ffa3457a0df27bf0e29c5aa9

  • SHA256

    7f7055a4e3cecdeffd1d86cb48153d91368394707e3c98564c3efbea09a13e5e

  • SHA512

    eaac29f399a2779f673e852de3beaf94af5a428e023af17f196177f44e53a3ea68b51f8f49b2231fc2024b046b8bf3398b1a5cdc90ae3830f8f771f31b942a60

  • SSDEEP

    384:q+NhC0phe4VxWt0W3J6T5fnfffff9CwZnptYcFmVc03K:rZpgP0W3Q/ZptYcFmVc6K

Malware Config

Extracted

Family

warzonerat

C2

willia2.ddns.net:5059

Targets

    • Target

      Payment copy.exe

    • Size

      26KB

    • MD5

      ac8b8cdb5dbab70faced147a56718cc7

    • SHA1

      76bef62765559588ffa3457a0df27bf0e29c5aa9

    • SHA256

      7f7055a4e3cecdeffd1d86cb48153d91368394707e3c98564c3efbea09a13e5e

    • SHA512

      eaac29f399a2779f673e852de3beaf94af5a428e023af17f196177f44e53a3ea68b51f8f49b2231fc2024b046b8bf3398b1a5cdc90ae3830f8f771f31b942a60

    • SSDEEP

      384:q+NhC0phe4VxWt0W3J6T5fnfffff9CwZnptYcFmVc03K:rZpgP0W3Q/ZptYcFmVc6K

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks