General

  • Target

    doc02606820230327115145 Our Ref S3831841.tar.gz.exe

  • Size

    960KB

  • Sample

    230329-hy2y7sfb84

  • MD5

    daf61c324b99483defa826425f5a3c6c

  • SHA1

    5f95e47d72d57ca73edd7d884f21912ba0120830

  • SHA256

    73aa9443a116f5f080fc98cba1e95378ae39d17b5de35e6f76df1482aca503f6

  • SHA512

    9cbdb8d21b27f74b0b1c650ad7f505cd09c88c57fabe9db01ee96857543d66f6792f00f36e9c9938502b7fe6d29471ee74fd8d9e823097c44ad16526b9e0a5fc

  • SSDEEP

    12288:SYcH/Ym8m40U1g6LfYdOKMhhLm733R3VoctIRy3+AhSsKySOVgA0klqUM5Z:SRgkwg6LfYdShiDtuUP3l75ShklqX

Malware Config

Extracted

Family

warzonerat

C2

peggyboo.duckdns.org:4545

Targets

    • Target

      doc02606820230327115145 Our Ref S3831841.exe

    • Size

      958KB

    • MD5

      8f9d3374b5f90a844d8d0b0f61492d4a

    • SHA1

      c24902da8cda61f97fc37cc2c8786c4013731a37

    • SHA256

      1f4d869399d9b218e7d9dd738129fdcff54c50c12f58a76772767fe272ce4c44

    • SHA512

      2e1183792d31b45b55429739f05b70660120c6e9a5d795fa538fcd0cbaab1913fb47720d499977d58a64200127e18acb1ca824ed219636cd8bdede73b4cef3d4

    • SSDEEP

      12288:CYcH/Ym8m40U1g6LfYdOKMhhLm733R3VoctIRy3+AhSsKySOVgA0klqUM5Zh:CRgkwg6LfYdShiDtuUP3l75ShklqXh

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • ModiLoader Second Stage

    • Warzone RAT payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks