General

  • Target

    PaymentSlipReveipt.exe

  • Size

    308KB

  • Sample

    230606-cjebpsbf45

  • MD5

    27c962bc41886b2fae4c822abfc796bc

  • SHA1

    e14f67bfe3b1cf5e9197b5e8437b23cdb141e0d9

  • SHA256

    dbe7fdd2f0e7270387053d2955f549a46a6699b29ece6b3ff20a6bd11c06064b

  • SHA512

    145e6946970c9167a14bfb517cea653b7843e89dc5d77723cb3abd51d40af9ccea4a0996a88bea8c2e1aae55811640135d37ebbf83ad458ec7ca5c8b3c35098b

  • SSDEEP

    6144:SYa6AvUotjvBsR61qoro5PBcxwN15a4Vr:SYYzjeRAqjcCBr

Malware Config

Extracted

Family

warzonerat

C2

194.180.48.228:5200

Targets

    • Target

      PaymentSlipReveipt.exe

    • Size

      308KB

    • MD5

      27c962bc41886b2fae4c822abfc796bc

    • SHA1

      e14f67bfe3b1cf5e9197b5e8437b23cdb141e0d9

    • SHA256

      dbe7fdd2f0e7270387053d2955f549a46a6699b29ece6b3ff20a6bd11c06064b

    • SHA512

      145e6946970c9167a14bfb517cea653b7843e89dc5d77723cb3abd51d40af9ccea4a0996a88bea8c2e1aae55811640135d37ebbf83ad458ec7ca5c8b3c35098b

    • SSDEEP

      6144:SYa6AvUotjvBsR61qoro5PBcxwN15a4Vr:SYYzjeRAqjcCBr

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Modifies Windows Firewall

    • Sets DLL path for service in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Modifies WinLogon

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks