General

  • Target

    INQUIRY 20230330.exe

  • Size

    623KB

  • Sample

    230330-x52pcaea28

  • MD5

    242e99979a3db8b0f4e1dfeb5259d490

  • SHA1

    e221b9efdb05e767878a43232a0bea02c1e573dc

  • SHA256

    bbe2edc7400d0104700d9e98c69a46932cad47779283209a4fa3b035d46daf09

  • SHA512

    03b8aceac2aa0330c8217d5a0248c145bb9efd12c825b73672a2a2b4d7292f27d6bfc3fb36a929a4c4811fe1a3e90db5c76888677a73753473c185137cd87e57

  • SSDEEP

    12288:leJ/sIuNNh6jszPXHF8wLqEnU5l/CBnTsUxI8/qMOqS4simOMt+W:1QjsrXHF7bICBnjl/simX

Malware Config

Extracted

Family

warzonerat

C2

panchak.duckdns.org:5050

Targets

    • Target

      INQUIRY 20230330.exe

    • Size

      623KB

    • MD5

      242e99979a3db8b0f4e1dfeb5259d490

    • SHA1

      e221b9efdb05e767878a43232a0bea02c1e573dc

    • SHA256

      bbe2edc7400d0104700d9e98c69a46932cad47779283209a4fa3b035d46daf09

    • SHA512

      03b8aceac2aa0330c8217d5a0248c145bb9efd12c825b73672a2a2b4d7292f27d6bfc3fb36a929a4c4811fe1a3e90db5c76888677a73753473c185137cd87e57

    • SSDEEP

      12288:leJ/sIuNNh6jszPXHF8wLqEnU5l/CBnTsUxI8/qMOqS4simOMt+W:1QjsrXHF7bICBnjl/simX

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks