General

  • Target

    b42e067f18f4cea6ab3982664c78da81b57d8949f71898d77eacc13e61bfc317

  • Size

    2.8MB

  • Sample

    221125-lvb56ace3v

  • MD5

    8118c2856c90a0668d8e1d2f8f96ca3f

  • SHA1

    53dafa742d3dec42ebea51c1d6d643c7b15c788c

  • SHA256

    b42e067f18f4cea6ab3982664c78da81b57d8949f71898d77eacc13e61bfc317

  • SHA512

    984f1ee6ee8d17bf6ed3e7da01261ba3e7817b86ca6f9e7fdfc40e0a4a93a4d579bff4db1d0d63320b4a1ba70efb78de4001487287742def9f7e99fdbf3a199a

  • SSDEEP

    3072:a4ulmi682JhXH8A765qPP6I8AD5Ul7ePzjPKCblLCdC1TcIFr33QxB4KU5YGdOrt:Nu92JhXH8Q65qPP6I8AD5Ul7Cl

Malware Config

Extracted

Family

warzonerat

C2

msdos.treatwellshome.xyz:5200

Targets

    • Target

      b42e067f18f4cea6ab3982664c78da81b57d8949f71898d77eacc13e61bfc317

    • Size

      2.8MB

    • MD5

      8118c2856c90a0668d8e1d2f8f96ca3f

    • SHA1

      53dafa742d3dec42ebea51c1d6d643c7b15c788c

    • SHA256

      b42e067f18f4cea6ab3982664c78da81b57d8949f71898d77eacc13e61bfc317

    • SHA512

      984f1ee6ee8d17bf6ed3e7da01261ba3e7817b86ca6f9e7fdfc40e0a4a93a4d579bff4db1d0d63320b4a1ba70efb78de4001487287742def9f7e99fdbf3a199a

    • SSDEEP

      3072:a4ulmi682JhXH8A765qPP6I8AD5Ul7ePzjPKCblLCdC1TcIFr33QxB4KU5YGdOrt:Nu92JhXH8Q65qPP6I8AD5Ul7Cl

    • Modifies WinLogon for persistence

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks