General

  • Target

    Order Inquiry.js

  • Size

    1KB

  • Sample

    221205-hp1psaeh68

  • MD5

    f384eeb88cfc352b593f2ad0327fc8e5

  • SHA1

    e6aefd80a85dde5d4d55189a2f1136d452b64a37

  • SHA256

    1e1d7df8408886f486df3e57ee5b292d98329d351f9ddbe17b013a2aa37a5afd

  • SHA512

    389847737982847e472f17fb6333f5559e39c63640eee1faa1922de73ac2f4c08e4b0afb94a417688194dc4451855df729a572059048a246eb8aabd4db0a1090

Malware Config

Targets

    • Target

      Order Inquiry.js

    • Size

      1KB

    • MD5

      f384eeb88cfc352b593f2ad0327fc8e5

    • SHA1

      e6aefd80a85dde5d4d55189a2f1136d452b64a37

    • SHA256

      1e1d7df8408886f486df3e57ee5b292d98329d351f9ddbe17b013a2aa37a5afd

    • SHA512

      389847737982847e472f17fb6333f5559e39c63640eee1faa1922de73ac2f4c08e4b0afb94a417688194dc4451855df729a572059048a246eb8aabd4db0a1090

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets DLL path for service in the registry

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks