General

  • Target

    0aa2bc2db95a3ae6bee14c0cfc0d59b7.exe

  • Size

    189KB

  • Sample

    230328-xh2qtscf42

  • MD5

    0aa2bc2db95a3ae6bee14c0cfc0d59b7

  • SHA1

    557024bce74469c84b12ae76fa741317a8e97d5a

  • SHA256

    fc3961ba7ba25c5d3da95cbe89f31051c8faba436297895ec65b24aebca93753

  • SHA512

    1fc3bc593e2d2acb7be08e20f716d67c3c2da32cf1dc637e051d647b294690eb0428e638209057fe2be02398113373e26146965fdb91e32c60b2e50a94b2c458

  • SSDEEP

    3072:WzPtbXqn6aR97tie5Niae2vl23G3Fzyffz8LTDh:Wz1bXq6aR97ViJ2vlz9yffz8LT

Malware Config

Extracted

Family

warzonerat

C2

dgorijan20785.hopto.org:5200

Targets

    • Target

      0aa2bc2db95a3ae6bee14c0cfc0d59b7.exe

    • Size

      189KB

    • MD5

      0aa2bc2db95a3ae6bee14c0cfc0d59b7

    • SHA1

      557024bce74469c84b12ae76fa741317a8e97d5a

    • SHA256

      fc3961ba7ba25c5d3da95cbe89f31051c8faba436297895ec65b24aebca93753

    • SHA512

      1fc3bc593e2d2acb7be08e20f716d67c3c2da32cf1dc637e051d647b294690eb0428e638209057fe2be02398113373e26146965fdb91e32c60b2e50a94b2c458

    • SSDEEP

      3072:WzPtbXqn6aR97tie5Niae2vl23G3Fzyffz8LTDh:Wz1bXq6aR97ViJ2vlz9yffz8LT

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Email Collection

1
T1114

Tasks