General

  • Target

    84cc7b5b7b1cd8448cf5529f493a6882016e75c85da54baa30e95fe32452f780

  • Size

    176KB

  • Sample

    230316-e3cckabc5y

  • MD5

    f2e4e0ba9fc3fe9d2229c31c4a5a40d0

  • SHA1

    835ddaa41c2111632f4564f200dbceb969851f1e

  • SHA256

    84cc7b5b7b1cd8448cf5529f493a6882016e75c85da54baa30e95fe32452f780

  • SHA512

    39abfa17838eb52e393041a8f2f1f8e47a88a26fb644ceeb4322d93d3fe82ab016a023b42569a3d58e079f837b606877a42c05e0855f7b2936fe3ab4d28612a5

  • SSDEEP

    3072:WfY/TU9fE9PEtuRbrDbPTMuOqCw5NQhDd3+4/qxvVHY0MLtTtQS0W1KHdqML:AYa6XrDbP6vw5ipvgvVHY0UTSJ9l

Malware Config

Extracted

Family

warzonerat

C2

omerlan.duckdns.org:6548

Targets

    • Target

      84cc7b5b7b1cd8448cf5529f493a6882016e75c85da54baa30e95fe32452f780

    • Size

      176KB

    • MD5

      f2e4e0ba9fc3fe9d2229c31c4a5a40d0

    • SHA1

      835ddaa41c2111632f4564f200dbceb969851f1e

    • SHA256

      84cc7b5b7b1cd8448cf5529f493a6882016e75c85da54baa30e95fe32452f780

    • SHA512

      39abfa17838eb52e393041a8f2f1f8e47a88a26fb644ceeb4322d93d3fe82ab016a023b42569a3d58e079f837b606877a42c05e0855f7b2936fe3ab4d28612a5

    • SSDEEP

      3072:WfY/TU9fE9PEtuRbrDbPTMuOqCw5NQhDd3+4/qxvVHY0MLtTtQS0W1KHdqML:AYa6XrDbP6vw5ipvgvVHY0UTSJ9l

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks