General

  • Target

    E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.tar.bz2

  • Size

    290KB

  • Sample

    221118-ba41bscb8v

  • MD5

    bc9426d394993549487069db1fae9e97

  • SHA1

    cc2ad58920ee368e89fa091fc200611a866c2a5a

  • SHA256

    4c7691f624522e1677014a57de1be3d58f8b499f51b703f50d4fe4a73ef6db3c

  • SHA512

    f375238c55cdb8a7a37cd1b80474824cd0f1343c2a968d42437739aa32545df0f9890d6b985ae54b61851b8f2150e6c7f2e38bda387cc4f0178c5f7d0ddb07f7

  • SSDEEP

    6144:VTmMkOpWE5pEyuvfe6DMbIpRQSvjjb2caUCp9s989k8z2A56Y:VTm3Oo7DM6RQSvj7UpQQ6AoY

Malware Config

Extracted

Family

warzonerat

C2

chexfotii.ddns.net:4545

Targets

    • Target

      E-PO-023635 - E-22-00343 - Ataya Table Escape at Heritage Village AUH 2022.exe

    • Size

      586KB

    • MD5

      1d84dc95d2a21666cc0038e0febd677f

    • SHA1

      452fd7c779e820c05d046f8d78eac6ed9ce44980

    • SHA256

      3ec75aa62228c2043c7834516a087d14fb0ff1cf89a060edb10cbd3e296e3fc4

    • SHA512

      a4e9c81b319e4c40c3093aad239c4f05743c7d9c01d1c0df819d3d422b768e61aa2dae3c84090584d2d1f6ffd17d5a66ea00c85fa26a5b96422412427af84557

    • SSDEEP

      12288:bDjeLlJcFNDJJCTbtCk1wvGMJfGb8/4OQL:bDiT6pyJcGMJfGw/LQL

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • ModiLoader Second Stage

    • Warzone RAT payload

    • Sets DLL path for service in the registry

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Modifies WinLogon

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks