General

  • Target

    Swift.rar

  • Size

    865KB

  • Sample

    230605-tnhy5ahe67

  • MD5

    71a7189d1727489c42a2265a3960ff9f

  • SHA1

    65d2187946d920d4973c24e4a0ac536996353c6d

  • SHA256

    bdccefbf2a7285c557c77c8b63e635c2c32f39553863d7f827155754ca3c0903

  • SHA512

    88d684bfe1c7c00b57bd5e2e1c645ff236c9e08abf976f8df20d1593343580da1f62212fdb9599dabd6ff3ad2805af63d815bb7e374448c60dbc2966c156f75a

  • SSDEEP

    12288:H9Id6OrPwqTQAwBTTvY0Z3l9+P/bnqvPPOmWnADUcHTNEVv5dHu:H9XyTFwtTpZ1E32POMLm9K

Malware Config

Extracted

Family

warzonerat

C2

nightmare4666.ddns.net:3443

Targets

    • Target

      Swift.exe

    • Size

      865KB

    • MD5

      bee78a8ce6898cd4f58ec73f4eebc141

    • SHA1

      edf970f4a4f8b021ba9383a3adac386c36342964

    • SHA256

      0a5bd6fed58b0293f910bc5d57f6a479a42bedecf040d486d3600bf3929615bc

    • SHA512

      0b1a08a2d9e30c5c14644fb40cf6dec128b76343565310d6a7d6fb2614030baf0c8e561fcb3b6bfcb6409869149334ed00b814fee6c58da7215eba942b01e8f8

    • SSDEEP

      12288:e9Id6OrPwqTQAwBTTvY0Z3l9+P/bnqvPPOmWnADUcHTNEVv5dHj:e9XyTFwtTpZ1E32POMLm9v

    • ModiLoader, DBatLoader

      ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • ModiLoader Second Stage

    • Warzone RAT payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks