General

  • Target

    76522e1121f296222f3a9c9913638e5e6e9ab4be9206fc86ed32c1827b44b689.zip

  • Size

    1KB

  • Sample

    221130-jtz5gseb4s

  • MD5

    40eab865241b89d3b4ff4d9c14a50043

  • SHA1

    a09aefb4d464a63c00ea7867b276bc12215dfeb0

  • SHA256

    3df95bc2c8d544fffef07b43c66d34eaf40ada5df17efdfbfc1ccd3456569b2b

  • SHA512

    ae8c338d67a3f8ef0f671feb7ef329f386927b8f285a768a413c5dfcfedad5475ee1dd0fc6609cfaca46728372ceb74515d004ce900893926029793d0f93a360

Malware Config

Targets

    • Target

      76522e1121f296222f3a9c9913638e5e6e9ab4be9206fc86ed32c1827b44b689.js

    • Size

      1KB

    • MD5

      840422981206fe204ad674b563497eee

    • SHA1

      fbadcc5fa1e489d965591d769da3bf7039fc5b7f

    • SHA256

      76522e1121f296222f3a9c9913638e5e6e9ab4be9206fc86ed32c1827b44b689

    • SHA512

      8cc95a62d66b7afcb8f402b4603773a3d3b877cdbf0c07492f75cc3b5bfc6e5cb91aa0997509b0e939a187ad8037d766ba23a4c3758da94a31940a4fc348d9ee

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks