General

  • Target

    payment copy.exe

  • Size

    864KB

  • Sample

    221209-jrjpqafe8s

  • MD5

    1e08c50ef201f659eb5ab9c062eaf175

  • SHA1

    dce99008688653553a14aa79cebf1b493ce46d92

  • SHA256

    3d388594d65a6af5c727962bc11fdb998d93158f96e9234a6e3d03a95a239c05

  • SHA512

    6f05910f013d49a1a2373d11c0eaadf8d318951904ce17a98ebf382b0a24a00cbf56a85db6e62299c4afd27ebe016fb0af2651fa838336170908d5be88eecf79

  • SSDEEP

    24576:j8Ds3l99UzgayfbKpBnf1km26DDdmOfM:jAs33WufbOBnf10+DhfM

Malware Config

Targets

    • Target

      payment copy.exe

    • Size

      864KB

    • MD5

      1e08c50ef201f659eb5ab9c062eaf175

    • SHA1

      dce99008688653553a14aa79cebf1b493ce46d92

    • SHA256

      3d388594d65a6af5c727962bc11fdb998d93158f96e9234a6e3d03a95a239c05

    • SHA512

      6f05910f013d49a1a2373d11c0eaadf8d318951904ce17a98ebf382b0a24a00cbf56a85db6e62299c4afd27ebe016fb0af2651fa838336170908d5be88eecf79

    • SSDEEP

      24576:j8Ds3l99UzgayfbKpBnf1km26DDdmOfM:jAs33WufbOBnf10+DhfM

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks