General

  • Target

    #PO.09877657890439888IpzJ3FEGdOMFjHn.PDF.exe

  • Size

    755KB

  • Sample

    221206-lh19hshc5x

  • MD5

    c9b1ecfd1ec4a4ebd841f77ee0e74ca0

  • SHA1

    54d8a155fbf50720ec99817a4e5dee29d021a0ed

  • SHA256

    f92ef33594e2dea236dd194b6d1c78ba5ace8702e5fa02fc48462073e8d8c010

  • SHA512

    a488ec12d8f90bee5f875b8cfb918b44bd41499545863b2c4da47963a2adccca3be3ffe05fd8412ee8db35520aa3686975b53c4fbce0aa245c12b21b6ef1f98d

  • SSDEEP

    12288:gCCcihz6Y1jJ0DFVWV3vhXTtva75ntqiMahkg586aWHff:lCZlN8WBvhXTtw5n8pahB5O8f

Malware Config

Extracted

Family

warzonerat

C2

37.0.14.207:70

Targets

    • Target

      #PO.09877657890439888IpzJ3FEGdOMFjHn.PDF.exe

    • Size

      755KB

    • MD5

      c9b1ecfd1ec4a4ebd841f77ee0e74ca0

    • SHA1

      54d8a155fbf50720ec99817a4e5dee29d021a0ed

    • SHA256

      f92ef33594e2dea236dd194b6d1c78ba5ace8702e5fa02fc48462073e8d8c010

    • SHA512

      a488ec12d8f90bee5f875b8cfb918b44bd41499545863b2c4da47963a2adccca3be3ffe05fd8412ee8db35520aa3686975b53c4fbce0aa245c12b21b6ef1f98d

    • SSDEEP

      12288:gCCcihz6Y1jJ0DFVWV3vhXTtva75ntqiMahkg586aWHff:lCZlN8WBvhXTtw5n8pahB5O8f

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks