General

  • Target

    Purchase Enquiry .js

  • Size

    1KB

  • Sample

    221130-er24vafc25

  • MD5

    840422981206fe204ad674b563497eee

  • SHA1

    fbadcc5fa1e489d965591d769da3bf7039fc5b7f

  • SHA256

    76522e1121f296222f3a9c9913638e5e6e9ab4be9206fc86ed32c1827b44b689

  • SHA512

    8cc95a62d66b7afcb8f402b4603773a3d3b877cdbf0c07492f75cc3b5bfc6e5cb91aa0997509b0e939a187ad8037d766ba23a4c3758da94a31940a4fc348d9ee

Malware Config

Targets

    • Target

      Purchase Enquiry .js

    • Size

      1KB

    • MD5

      840422981206fe204ad674b563497eee

    • SHA1

      fbadcc5fa1e489d965591d769da3bf7039fc5b7f

    • SHA256

      76522e1121f296222f3a9c9913638e5e6e9ab4be9206fc86ed32c1827b44b689

    • SHA512

      8cc95a62d66b7afcb8f402b4603773a3d3b877cdbf0c07492f75cc3b5bfc6e5cb91aa0997509b0e939a187ad8037d766ba23a4c3758da94a31940a4fc348d9ee

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks