General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.20423.16567.exe

  • Size

    908KB

  • Sample

    230110-nnv1ssfh35

  • MD5

    30f5492ddedc404154ef35ff31b6901c

  • SHA1

    cfb9bacbd07ab8c9432a6158b1c876041b5a9946

  • SHA256

    16a3f220167bcdefd947617ea5f392677706f4d2a051bb03d0072bfdd42ac61b

  • SHA512

    b38392a6e4d9b2becd8b10299ff5320c219abc7eefc1c3f17b56e4940874411dae784e4cbd4a709921cc85d4f3e124c70909cbd9162d27261f7cb7ce7fd685b8

  • SSDEEP

    12288:s4wdAWeD2sm2IQrzSyVSdndweMbYWZ0QomdcKF4x8Vnnnnnnnnnnnnnnnnnnnnnr:tYAhs2NrzSyVSdn5wYW+GOQ0VzOt

Malware Config

Extracted

Family

warzonerat

C2

godhlep.ddns.net:4032

Targets

    • Target

      SecuriteInfo.com.Win32.PWSX-gen.20423.16567.exe

    • Size

      908KB

    • MD5

      30f5492ddedc404154ef35ff31b6901c

    • SHA1

      cfb9bacbd07ab8c9432a6158b1c876041b5a9946

    • SHA256

      16a3f220167bcdefd947617ea5f392677706f4d2a051bb03d0072bfdd42ac61b

    • SHA512

      b38392a6e4d9b2becd8b10299ff5320c219abc7eefc1c3f17b56e4940874411dae784e4cbd4a709921cc85d4f3e124c70909cbd9162d27261f7cb7ce7fd685b8

    • SSDEEP

      12288:s4wdAWeD2sm2IQrzSyVSdndweMbYWZ0QomdcKF4x8Vnnnnnnnnnnnnnnnnnnnnnr:tYAhs2NrzSyVSdn5wYW+GOQ0VzOt

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • ModiLoader Second Stage

    • Warzone RAT payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks