General

  • Target

    d94f93beb5e5cafbed05b68b50b89a01.bin

  • Size

    689KB

  • Sample

    230316-gtzgvahc72

  • MD5

    e2c3cc567c4614834ef8a0aedf080f27

  • SHA1

    b9a7260dc7b6f9da8be8ec267fbb2e96d5ae6eeb

  • SHA256

    7a1044d3884b5356ef32f799b77e98da1b618c22b412be9107045023241a0b4d

  • SHA512

    2ee44f0c8719be5add774992aa51afd2f9d9a119f1b5099a9539a423b330f5c743cbe6fb70e6cafcc4f5a7b4dcdc9d2956a8f69662d14287cdc2d821719437e8

  • SSDEEP

    12288:BdA8XAvJ7OpyhAlNHUgV3ZcimbrztpZ8amB2t+Yzg9naJ8XuR2cNUtgnTm1Wy+1v:zA8XABSpy+N/NDutpZ8amB2cYz2SHm1k

Malware Config

Extracted

Family

warzonerat

C2

74.201.28.114:3900

Targets

    • Target

      adb09eb6718421aff9cfd0dd2188ceab7c52e4c1f33ff3b3e56d37e8b09aadd1.bin

    • Size

      778KB

    • MD5

      d94f93beb5e5cafbed05b68b50b89a01

    • SHA1

      fb828f7fdf2aa5b83efef41754ba6c8b4a437b84

    • SHA256

      adb09eb6718421aff9cfd0dd2188ceab7c52e4c1f33ff3b3e56d37e8b09aadd1

    • SHA512

      3f2fc14d7004f29d88649ad885df8cca54a0d1c1cdf3e301ec32fc59c8f0c7cf66b9c8289fcd921f92bac157c3cc222f0e07d641a8cb889c005d854d44a92d12

    • SSDEEP

      12288:giz2j8iJGRTwdfL6pvv0WC1R5LlLzrycVCBy0L/Y+M1eZ5qOP6bz8VoRHTpZI:ejRJTZ69pCf5xLzecVa/Y+lHhS3uup

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Command-Line Interface

1
T1059

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks