General

  • Target

    242e99979a3db8b0f4e1dfeb5259d490.bin

  • Size

    497KB

  • Sample

    230401-bgyrwseh66

  • MD5

    d4e731bf2b38c0d5cc53096eced852fb

  • SHA1

    27a6a96d4fdac02b321a1964270cae7d3f177fdc

  • SHA256

    f7eadefaec90e8e2faaab3e770f3b65f186459a467176c740fb83aff665c62ab

  • SHA512

    91e61d79bc5e78dd0e9133e31784069d08b67153a9d71796e44ce4334700e8942b66ccfc5d3236a10c3899736774601e3732f70029b66ad477c477eb12cbac67

  • SSDEEP

    12288:mnq1urS1c3s/zn/d2u0KqZb/nOszPtpLZqWlV/RFEgAb:mp36z/dnq9OszHNRz/Rf2

Malware Config

Extracted

Family

warzonerat

C2

panchak.duckdns.org:5050

Targets

    • Target

      bbe2edc7400d0104700d9e98c69a46932cad47779283209a4fa3b035d46daf09.exe

    • Size

      623KB

    • MD5

      242e99979a3db8b0f4e1dfeb5259d490

    • SHA1

      e221b9efdb05e767878a43232a0bea02c1e573dc

    • SHA256

      bbe2edc7400d0104700d9e98c69a46932cad47779283209a4fa3b035d46daf09

    • SHA512

      03b8aceac2aa0330c8217d5a0248c145bb9efd12c825b73672a2a2b4d7292f27d6bfc3fb36a929a4c4811fe1a3e90db5c76888677a73753473c185137cd87e57

    • SSDEEP

      12288:leJ/sIuNNh6jszPXHF8wLqEnU5l/CBnTsUxI8/qMOqS4simOMt+W:1QjsrXHF7bICBnjl/simX

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks