General

  • Target

    92e54cb5fb1d4e2c874f09b5c10a617dc00d845970c094e426683d6989c5a182

  • Size

    203KB

  • Sample

    230315-s68rtsgc2y

  • MD5

    8c8ee58eacb110d5598f723ecd7e948c

  • SHA1

    b9be417a07aa65a317001ba2976cdd80fb267174

  • SHA256

    92e54cb5fb1d4e2c874f09b5c10a617dc00d845970c094e426683d6989c5a182

  • SHA512

    d474c65d401f18fc2343fd086ed1581df4adf1edbf087f1a0a72e97e7c4fc17bb804e7739eb27b5715614ea9071078cc385e3351375d9a89228865f3a072a4a7

  • SSDEEP

    3072:WfY/TU9fE9PEtuNb246i/iIasUc9dWaYU2WfDRuTDP3KlORQ8TsN543G+RWuWCBg:AYa6724zLasU+6UZfDon/8h8e6WqFY

Malware Config

Extracted

Family

warzonerat

C2

omerlan.duckdns.org:6548

Targets

    • Target

      92e54cb5fb1d4e2c874f09b5c10a617dc00d845970c094e426683d6989c5a182

    • Size

      203KB

    • MD5

      8c8ee58eacb110d5598f723ecd7e948c

    • SHA1

      b9be417a07aa65a317001ba2976cdd80fb267174

    • SHA256

      92e54cb5fb1d4e2c874f09b5c10a617dc00d845970c094e426683d6989c5a182

    • SHA512

      d474c65d401f18fc2343fd086ed1581df4adf1edbf087f1a0a72e97e7c4fc17bb804e7739eb27b5715614ea9071078cc385e3351375d9a89228865f3a072a4a7

    • SSDEEP

      3072:WfY/TU9fE9PEtuNb246i/iIasUc9dWaYU2WfDRuTDP3KlORQ8TsN543G+RWuWCBg:AYa6724zLasU+6UZfDon/8h8e6WqFY

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks