General

  • Target

    SecuriteInfo.com.HEUR.93.6430.exe

  • Size

    307KB

  • Sample

    230327-mjazdsda29

  • MD5

    dbaa3eedb475065eb8d88c1e9e04c2de

  • SHA1

    bd2bbf3940dbfa53ddacba057333c88c77e5372d

  • SHA256

    853e1ec7d4d8fa449d88746cab1bfac6074e0d81e9a26ef6948793059e9bd781

  • SHA512

    9dea4831e8b01d0f9726ba9d31f786fdbaf1334340042282548a138b83e13d639403d814b8f16ee7572044941b3417c503240ee56c8c4d782c265fb6520b4509

  • SSDEEP

    6144:u8fqDye3NCT8yGjm04y0O12udoEUAaZbyHfI:tiCgD4wldEiHfI

Malware Config

Extracted

Family

warzonerat

C2

91.192.100.10:11011

Targets

    • Target

      SecuriteInfo.com.HEUR.93.6430.exe

    • Size

      307KB

    • MD5

      dbaa3eedb475065eb8d88c1e9e04c2de

    • SHA1

      bd2bbf3940dbfa53ddacba057333c88c77e5372d

    • SHA256

      853e1ec7d4d8fa449d88746cab1bfac6074e0d81e9a26ef6948793059e9bd781

    • SHA512

      9dea4831e8b01d0f9726ba9d31f786fdbaf1334340042282548a138b83e13d639403d814b8f16ee7572044941b3417c503240ee56c8c4d782c265fb6520b4509

    • SSDEEP

      6144:u8fqDye3NCT8yGjm04y0O12udoEUAaZbyHfI:tiCgD4wldEiHfI

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Remote System Discovery

1
T1018

Collection

Email Collection

1
T1114

Tasks