General

  • Target

    Purchase Order NO 108455X11 pdf.7z

  • Size

    525KB

  • Sample

    221114-h1nvcsaf5x

  • MD5

    331c0d0061c5e5cfcc7b3d5a5fe62b42

  • SHA1

    be12f3c8c6e79d468b75bcee8c413f4db2873cbf

  • SHA256

    8b9e1bc6d3b3d05b719d8170558d4b7f83c55c23201eb3e6d9c1406020496084

  • SHA512

    4b891300adee201a8fe5f4518c6f0d90c467597e06a295a93b458621f1e9d4fd10915f8ab43f8ff47d514b8115e62130640eef581a413af46159246d4aa846cc

  • SSDEEP

    12288:8gcP0xN23lK3qQlTxNEcv1pLGw/Bc/+/5kU70hvZurMHZykZ13f1/M70B:8N0xIK6QRvnGwZc/I2k0hvZZHZyk5M7u

Malware Config

Extracted

Family

warzonerat

C2

checkingss.duckdns.org:73

Targets

    • Target

      Purchase Order NO 108455X11 pdf.exe

    • Size

      596KB

    • MD5

      0abbf894de1f9b7f2c5e06f9df021877

    • SHA1

      f3ccb34fb689ef7cef609b7151ba7a6c927235b4

    • SHA256

      8d5dff62315a46f1edc209042ae342f554e20102d5e9954d720d9b2864712db9

    • SHA512

      ea6f52ba56cbf16966005c488f3e0c26ae6514e92ec7bee60fad0c33889b919b23ffcdba692820747eedfbe24d7d955148ad252fe4d32ff7483e1a21f13a2a90

    • SSDEEP

      12288:c8p3QmQeRPoYub/eWTsGhEmRrBCRkihqRBbDj507kyLL1XXMQ:c09Nc/JhfMQBLmoyLJnM

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks