General

  • Target

    Equipment's A107 Prime Power Logistic.exe

  • Size

    1.0MB

  • Sample

    221109-ggvywsfghj

  • MD5

    0ddbb8eedaca75c0acb0a034e1eae063

  • SHA1

    93501b2d5019dcc2aa56c3e7bce76da4970b61ef

  • SHA256

    7e0cfcc29e5cfaa2e149018b35bd3776fae867467ae2b91c65f7c873bf8f9a8a

  • SHA512

    4135facb244dce9c18bd64c736cba8105001982bc309dc3dfb03cbdd1e079d8fcdb25fc9d50c425ba43ae3772848ec25b06dc1b6a5016ea45da53d4809fa3b9d

  • SSDEEP

    24576:rAOcZGRABC2nDlqRpNFkHTr+Mo5pemHI0Yuyq3:t4DQR2xo5EmHWq3

Malware Config

Extracted

Family

warzonerat

C2

chexfotii.ddns.net:4545

Targets

    • Target

      Equipment's A107 Prime Power Logistic.exe

    • Size

      1.0MB

    • MD5

      0ddbb8eedaca75c0acb0a034e1eae063

    • SHA1

      93501b2d5019dcc2aa56c3e7bce76da4970b61ef

    • SHA256

      7e0cfcc29e5cfaa2e149018b35bd3776fae867467ae2b91c65f7c873bf8f9a8a

    • SHA512

      4135facb244dce9c18bd64c736cba8105001982bc309dc3dfb03cbdd1e079d8fcdb25fc9d50c425ba43ae3772848ec25b06dc1b6a5016ea45da53d4809fa3b9d

    • SSDEEP

      24576:rAOcZGRABC2nDlqRpNFkHTr+Mo5pemHI0Yuyq3:t4DQR2xo5EmHWq3

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Executes dropped EXE

    • Sets DLL path for service in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks