General

  • Target

    TSDPL for GSTR3b.cab

  • Size

    365KB

  • Sample

    221124-ba65page92

  • MD5

    d4089af74af461050d7c7162f9676f84

  • SHA1

    d65ea1af884c6725fa450a520869f5297a1b7564

  • SHA256

    42b61aba751c011b37720d8ca0ef81d113f24162fde40eda6f4bcfc1c51f669d

  • SHA512

    eb2f480864afa4dc2821a69467b4cb3d199bb63cbc1f3f3435da023cc2ddd49ef96000e464c5146271ba68132836f12fe706c96db01031dc45b45c487241be95

  • SSDEEP

    6144:u8HzG9f3yHFuvEMTe3Mrhkm2E3LOPcJX3eDQ+ysNX/Z53PYxpM2fINMYa:u8HzGB3yHFJGQKnT+yK3YxN

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://drive.google.com/uc?export=download&id=1Dbjqv3kYu9z-oWAyCtOblfNRuOjXFyFa

Extracted

Family

warzonerat

C2

nightmare4666.ddns.net:2442

Targets

    • Target

      TSDPL for GSTR3b.exe

    • Size

      813KB

    • MD5

      96687cb64b98418c573ee65753a72e33

    • SHA1

      d20ada54342596cd29bf7f66bc86d4503c4cfea4

    • SHA256

      c410af32a481222f15dd9babe626182317e7d76d603d2eb001cccd213a258873

    • SHA512

      b9f4e51985e839ece1f1bfb74ce1c0ffa232f848cdbef5a1c65ed3e703096074b779b509c1369060a96e924d4eae7e80049639e886923271b4d576ca725746b9

    • SSDEEP

      12288:vOrAkZrlpZxc3NKqgw9ONuRJooNN5dHVqTdTB2O4rwSMpxwhxjgV:vs3hp4c6/n5q5oOqLM2x0V

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • ModiLoader Second Stage

    • Warzone RAT payload

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks