General

  • Target

    aaa_a.exe

  • Size

    10KB

  • Sample

    221129-qs92mafh3w

  • MD5

    64c471afddb2559890a900fb2172e441

  • SHA1

    72ae1f50394fb827d47f07787fb8f90d977c2285

  • SHA256

    0b8bcd0fe629f9c5750b8016b83ff47e88138a89c8cf1840d18ed4d45a9fa802

  • SHA512

    5ebf144059595ae93087a38962ccbf377df2850525f140ae07aa2d73dd5352947173580722a2ffceb85651d7b7ddf2133bd4dedbf3f6ab820f7a70bc537dcfa3

  • SSDEEP

    192:5GhkR2CsJcAnLYn79k8eCmN0l47E++8stYcFmVc03KYk:IaRWJcgLYn79k8/mf7E++ptYcFmVc036

Malware Config

Targets

    • Target

      aaa_a.exe

    • Size

      10KB

    • MD5

      64c471afddb2559890a900fb2172e441

    • SHA1

      72ae1f50394fb827d47f07787fb8f90d977c2285

    • SHA256

      0b8bcd0fe629f9c5750b8016b83ff47e88138a89c8cf1840d18ed4d45a9fa802

    • SHA512

      5ebf144059595ae93087a38962ccbf377df2850525f140ae07aa2d73dd5352947173580722a2ffceb85651d7b7ddf2133bd4dedbf3f6ab820f7a70bc537dcfa3

    • SSDEEP

      192:5GhkR2CsJcAnLYn79k8eCmN0l47E++8stYcFmVc03KYk:IaRWJcgLYn79k8/mf7E++ptYcFmVc036

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks