General

  • Target

    91b7d74c915549719b90515f7dc82586b304f305b662b2336766611775303092

  • Size

    1.4MB

  • Sample

    221130-rjzpzagc87

  • MD5

    226d09965a7206e7e91212da80e08ffb

  • SHA1

    6decc224a3bb4614e4695c95ad2574eb2a13832c

  • SHA256

    91b7d74c915549719b90515f7dc82586b304f305b662b2336766611775303092

  • SHA512

    379005c6a479a8f14b3c3e4c5293350f6b870f75ee86f05d4b8cca04744685f9bba57af023897c4ab317d21e3451433064893b33f7c6a4f3a721b97c0d178d78

  • SSDEEP

    12288:DUrx89Suu+roPvsz+DSWutLMXa+jkm3HMpknqPx8ZrbXCnuH57pUoyuDOeu9eWKg:

Malware Config

Extracted

Family

warzonerat

C2

xls.medicelcoolers.cn:5200

Targets

    • Target

      91b7d74c915549719b90515f7dc82586b304f305b662b2336766611775303092

    • Size

      1.4MB

    • MD5

      226d09965a7206e7e91212da80e08ffb

    • SHA1

      6decc224a3bb4614e4695c95ad2574eb2a13832c

    • SHA256

      91b7d74c915549719b90515f7dc82586b304f305b662b2336766611775303092

    • SHA512

      379005c6a479a8f14b3c3e4c5293350f6b870f75ee86f05d4b8cca04744685f9bba57af023897c4ab317d21e3451433064893b33f7c6a4f3a721b97c0d178d78

    • SSDEEP

      12288:DUrx89Suu+roPvsz+DSWutLMXa+jkm3HMpknqPx8ZrbXCnuH57pUoyuDOeu9eWKg:

    • Modifies WinLogon for persistence

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks