General

  • Target

    a67e7e5c5271fda729143052d48dd615

  • Size

    236KB

  • Sample

    240226-q146cafe71

  • MD5

    a67e7e5c5271fda729143052d48dd615

  • SHA1

    bb1f7cd0043595bf26c7f2fc1473c12fbd66fc28

  • SHA256

    4e9666f55da5bbfbcddfb9b6066d4c1eca7a3092e0456999b6e3408c2e3edfbc

  • SHA512

    35a4fc62e1b763d38f86655384879f50b2025885ce3bb038b026b6ae599946046112cbeca71f818cc44b74755037a54960bd30b53cf3a944e105bcd4bda83b9d

  • SSDEEP

    3072:AyWUYAlmXkJr4Dul8kZyLA93qlUD2mvwV6bFcHSRoodGv8Z36CxVYwwBJ785v7W6:AksBi17NCFYp3rtHmqbK65/

Malware Config

Extracted

Family

warzonerat

C2

185.140.53.41:2104

Targets

    • Target

      a67e7e5c5271fda729143052d48dd615

    • Size

      236KB

    • MD5

      a67e7e5c5271fda729143052d48dd615

    • SHA1

      bb1f7cd0043595bf26c7f2fc1473c12fbd66fc28

    • SHA256

      4e9666f55da5bbfbcddfb9b6066d4c1eca7a3092e0456999b6e3408c2e3edfbc

    • SHA512

      35a4fc62e1b763d38f86655384879f50b2025885ce3bb038b026b6ae599946046112cbeca71f818cc44b74755037a54960bd30b53cf3a944e105bcd4bda83b9d

    • SSDEEP

      3072:AyWUYAlmXkJr4Dul8kZyLA93qlUD2mvwV6bFcHSRoodGv8Z36CxVYwwBJ785v7W6:AksBi17NCFYp3rtHmqbK65/

    • Modifies Windows Defender Real-time Protection settings

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Warzone RAT payload

    • Windows security modification

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

2
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Tasks