General

  • Target

    PURCHASE ORDER.doc

  • Size

    78KB

  • Sample

    230215-3f9ljsed3w

  • MD5

    64559d83eb87d528a109b1e3a067bb9a

  • SHA1

    4711cd71b583f87548d699c14e8a39a595b7a70b

  • SHA256

    284f55fed83bb6e37858ff016660423600caadf375aa5ed8333c418bc6a03d36

  • SHA512

    c887bda5ca7d62c1586dd8454b1a5e56c4e156329b99104e4db38b4b54b37c4931a2da8838a6ffb9c1c1798f1e1f6f4eda951a691c768868825a04587b7502b8

  • SSDEEP

    1536:lZlUideVtGei5nvxHySvPlVFd5pw7WpNY3q38iVTt:lZlUIuSvxzPlVwap4Wd

Malware Config

Targets

    • Target

      PURCHASE ORDER.doc

    • Size

      78KB

    • MD5

      64559d83eb87d528a109b1e3a067bb9a

    • SHA1

      4711cd71b583f87548d699c14e8a39a595b7a70b

    • SHA256

      284f55fed83bb6e37858ff016660423600caadf375aa5ed8333c418bc6a03d36

    • SHA512

      c887bda5ca7d62c1586dd8454b1a5e56c4e156329b99104e4db38b4b54b37c4931a2da8838a6ffb9c1c1798f1e1f6f4eda951a691c768868825a04587b7502b8

    • SSDEEP

      1536:lZlUideVtGei5nvxHySvPlVFd5pw7WpNY3q38iVTt:lZlUIuSvxzPlVwap4Wd

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks