General

  • Target

    afa887c1eb5644f68522d1a298942459

  • Size

    236KB

  • Sample

    240229-2nx22sef3w

  • MD5

    afa887c1eb5644f68522d1a298942459

  • SHA1

    4d0feb5610502cb7f33a5d7e6e93922d6b26a1b2

  • SHA256

    2fd08e554d205eff9cc16a27e59b94abad98311738a109b8efe3523291833c3c

  • SHA512

    f746e91bc6981e6f53f95f032e901ddbad7edcbde004f189d350552d6f558310a0227535b8c086b5f0f88107a8e721aedf12c35764a9dcc41f9831fa642f4c23

  • SSDEEP

    3072:PWUYAlmXkJr4Dul8kZyLA93qlUD2mvwV6bFcHSRoodGv8Z36CxVYwwBJ785v7W8g:vsBi17NCFYp3rtHmqbK65K

Malware Config

Extracted

Family

warzonerat

C2

185.140.53.41:2104

Targets

    • Target

      afa887c1eb5644f68522d1a298942459

    • Size

      236KB

    • MD5

      afa887c1eb5644f68522d1a298942459

    • SHA1

      4d0feb5610502cb7f33a5d7e6e93922d6b26a1b2

    • SHA256

      2fd08e554d205eff9cc16a27e59b94abad98311738a109b8efe3523291833c3c

    • SHA512

      f746e91bc6981e6f53f95f032e901ddbad7edcbde004f189d350552d6f558310a0227535b8c086b5f0f88107a8e721aedf12c35764a9dcc41f9831fa642f4c23

    • SSDEEP

      3072:PWUYAlmXkJr4Dul8kZyLA93qlUD2mvwV6bFcHSRoodGv8Z36CxVYwwBJ785v7W8g:vsBi17NCFYp3rtHmqbK65K

    • Modifies Windows Defender Real-time Protection settings

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Warzone RAT payload

    • Windows security modification

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

2
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Tasks