General

  • Target

    Izvod broj 76 ra?una 160-0000000471177-29·pdf.exe

  • Size

    628KB

  • Sample

    221205-ld7kqsah61

  • MD5

    b6db2555a517738e8b36562c90d0abe6

  • SHA1

    4ca042e5a79eaf3a95bb6aff7fd749c8483b9aea

  • SHA256

    2ce431fd24a816b14cf7bc9110b959addbe592c8994c7cc8f5b83b8b836ccd93

  • SHA512

    028277ffbc9af45c34cb345a8551cd590f50f8d3c127c380b6e282a01742605be9df7ed3af814cde811d4a9a4dce3fb8592cf4faafe2a803a3aae2fe5fb47256

  • SSDEEP

    12288:FPuYd+V6b1momPZeftQ68cf32IZI8tjDw7ACYmz/:FPuYd+V6bIomxit2iIuQ7ACY

Malware Config

Extracted

Family

warzonerat

C2

bryandatabase.duckdns.org:46564

Targets

    • Target

      Izvod broj 76 ra?una 160-0000000471177-29·pdf.exe

    • Size

      628KB

    • MD5

      b6db2555a517738e8b36562c90d0abe6

    • SHA1

      4ca042e5a79eaf3a95bb6aff7fd749c8483b9aea

    • SHA256

      2ce431fd24a816b14cf7bc9110b959addbe592c8994c7cc8f5b83b8b836ccd93

    • SHA512

      028277ffbc9af45c34cb345a8551cd590f50f8d3c127c380b6e282a01742605be9df7ed3af814cde811d4a9a4dce3fb8592cf4faafe2a803a3aae2fe5fb47256

    • SSDEEP

      12288:FPuYd+V6b1momPZeftQ68cf32IZI8tjDw7ACYmz/:FPuYd+V6bIomxit2iIuQ7ACY

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks