General

  • Target

    NEW ORDER.ace

  • Size

    26KB

  • Sample

    230511-vp9c5sba5s

  • MD5

    327a28b816e000b16c567eb7df943fe5

  • SHA1

    065745ae91b5263813b4766d5906e1a687a1a0a1

  • SHA256

    a7400fc6a15efb3ba5d663c47258ad3b79696ca39eedf8d29e5d4686518bc740

  • SHA512

    5eab71eaf880cdf7ca8d2ede073eab55827d737b0b6db8f95fd49d9f1b5d4908f980c64334554101641b35e28f6efbaa4e4e5ed52ae30383c2ed97af1215438f

  • SSDEEP

    768:nuBLR9ys/OqZVbklWiXS4v8Rljh6Xz9nkRTcza:uBL3Z7ZRklWiC44LKlkhn

Malware Config

Extracted

Family

warzonerat

C2

51.75.209.245:5252

Targets

    • Target

      NEW ORDER.exe

    • Size

      64KB

    • MD5

      35c834fc25778529bde95c02a5305d84

    • SHA1

      50dc363ea605f63ea2e11518c82d199e588dd2bd

    • SHA256

      2db1ee71637f8e3431085b022e05551e621d8ca97215495a1304e016f4ceb74d

    • SHA512

      d64e0107d03ed8f478d65a8e531982faf49d741bf23c6abe8c3f8699693a4cf81cf633afe28bd44bf263b9a9a6b04a282b206d7ce7aca121f1a3b9cb33c73f59

    • SSDEEP

      1536:fra2PYE8+se630VDcM7TPxdF8o75F943hh:fra2gE8+SEVDcMfxvXX4

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Downloads MZ/PE file

    • Modifies Windows Firewall

    • Sets DLL path for service in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks