General

  • Target

    Obavestenje o prilivu za 16000501003826304627.xls

  • Size

    128KB

  • Sample

    221125-vgtygseh7y

  • MD5

    cadc7a1ce95a518b28bc427259034546

  • SHA1

    5f362f13ceb06e1b8e088bbaa5fba367a6bff837

  • SHA256

    51d7e9d83ee47fde362716e9c50252dff4ea3891a2cf89e4be84d1551d104688

  • SHA512

    16db805befc401a2aa5883aedfff24d9785c9df31f535221779a5d6090a22ada96025739c42ccb6ed0208b8c43015db6996dba688d95fc8b461988b2c92a6e3e

  • SSDEEP

    3072:msk3hbdlylKsgqopeJBWhZFGkE+cL2NdAnROAPDU0wERoB1HBCzEY/G0aDYKtOKW:zk3hbdlylKsgqopeJBWhZFVE+W2NdARX

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://www.voievodulgelu.ro/owncloud/index.php/s/sX8sarn7G0Cmusz/download

Targets

    • Target

      Obavestenje o prilivu za 16000501003826304627.xls

    • Size

      128KB

    • MD5

      cadc7a1ce95a518b28bc427259034546

    • SHA1

      5f362f13ceb06e1b8e088bbaa5fba367a6bff837

    • SHA256

      51d7e9d83ee47fde362716e9c50252dff4ea3891a2cf89e4be84d1551d104688

    • SHA512

      16db805befc401a2aa5883aedfff24d9785c9df31f535221779a5d6090a22ada96025739c42ccb6ed0208b8c43015db6996dba688d95fc8b461988b2c92a6e3e

    • SSDEEP

      3072:msk3hbdlylKsgqopeJBWhZFGkE+cL2NdAnROAPDU0wERoB1HBCzEY/G0aDYKtOKW:zk3hbdlylKsgqopeJBWhZFVE+W2NdARX

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks