General

  • Target

    PO-11221001080.doc

  • Size

    27KB

  • Sample

    221201-nj8q4agc7s

  • MD5

    54d44fd164775f48934f95be9210712c

  • SHA1

    21b6eb36fda7271f1943d4f5a5b5f7b145ad4ae2

  • SHA256

    28e41e8cc995c7e4c893c9719785f91d54c880c530b6fd34cdefbb93531a5b1f

  • SHA512

    78645e9f2a297bb8934c1268d1f3f7a6a6077b72cea31d8dc5eb0bf69322fe55f5771613bfb684cb5a56d16d4b31529f54bddf0b9518d3cc2fa530f5481c2f87

  • SSDEEP

    768:sFx0XaIsnPRIa4fwJMr5j0CMukJfHh9y4pE3F/pQEVj1:sf0Xvx3EMGzVJv/S3F/3Z1

Malware Config

Extracted

Family

remcos

Botnet

PeterObi2023

C2

76.8.53.133:1198

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    sdfge.exe

  • delete_file

    false

  • hide_file

    true

  • hide_keylog_file

    false

  • install_flag

    true

  • install_path

    %AppData%

  • keylog_crypt

    false

  • keylog_file

    fghoiuytr.dat

  • keylog_flag

    false

  • mouse_option

    false

  • mutex

    fghjcvbn-UURPOS

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    dfghrtyu

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

remcos

Botnet

IYKE

C2

76.8.53.133:1198

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    explorer.exe

  • copy_folder

    machines

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    true

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    12345MEEE

  • mouse_option

    false

  • mutex

    12345MEEE-NS9UK1

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    explorer

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

warzonerat

C2

76.8.53.133:1198

Targets

    • Target

      PO-11221001080.doc

    • Size

      27KB

    • MD5

      54d44fd164775f48934f95be9210712c

    • SHA1

      21b6eb36fda7271f1943d4f5a5b5f7b145ad4ae2

    • SHA256

      28e41e8cc995c7e4c893c9719785f91d54c880c530b6fd34cdefbb93531a5b1f

    • SHA512

      78645e9f2a297bb8934c1268d1f3f7a6a6077b72cea31d8dc5eb0bf69322fe55f5771613bfb684cb5a56d16d4b31529f54bddf0b9518d3cc2fa530f5481c2f87

    • SSDEEP

      768:sFx0XaIsnPRIa4fwJMr5j0CMukJfHh9y4pE3F/pQEVj1:sf0Xvx3EMGzVJv/S3F/3Z1

    • Remcos

      Remcos is a closed-source remote control and surveillance software.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Exploitation for Client Execution

1
T1203

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Tasks