General

  • Target

    c4be103b1502b63faf9f0f18954904f1.exe

  • Size

    778KB

  • Sample

    230420-hfr2aaab3w

  • MD5

    c4be103b1502b63faf9f0f18954904f1

  • SHA1

    c49a722c5615005c768a6fb6ec9136c83ae84a9c

  • SHA256

    0c068a04f71f9fb987981519ad4fa540d88babba65a76c10e3640cf0d39e49f2

  • SHA512

    b69db3a249a1b759d0981bcc8a999c1778c6edb7e0a2c51672e89d3c416f9e77e9fbc6cb80060b7dd87c9bdcc0b6d29c4d5d380fe97f86274451bec492e2fcab

  • SSDEEP

    12288:9jtATpxC7cYFqGwib8yzaeCvFJIqtIz2X9kJ/PufCUWUo2a:9jt2pHYkUraDvFTIaNkJ/Pu/ror

Malware Config

Extracted

Family

warzonerat

C2

donelpacino.ddns.net:4545

Targets

    • Target

      c4be103b1502b63faf9f0f18954904f1.exe

    • Size

      778KB

    • MD5

      c4be103b1502b63faf9f0f18954904f1

    • SHA1

      c49a722c5615005c768a6fb6ec9136c83ae84a9c

    • SHA256

      0c068a04f71f9fb987981519ad4fa540d88babba65a76c10e3640cf0d39e49f2

    • SHA512

      b69db3a249a1b759d0981bcc8a999c1778c6edb7e0a2c51672e89d3c416f9e77e9fbc6cb80060b7dd87c9bdcc0b6d29c4d5d380fe97f86274451bec492e2fcab

    • SSDEEP

      12288:9jtATpxC7cYFqGwib8yzaeCvFJIqtIz2X9kJ/PufCUWUo2a:9jt2pHYkUraDvFTIaNkJ/Pu/ror

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • ModiLoader Second Stage

    • Warzone RAT payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks