General

  • Target

    c67c1797ac06edcba5d78083ba87b357

  • Size

    236KB

  • Sample

    240313-v83dyadb29

  • MD5

    c67c1797ac06edcba5d78083ba87b357

  • SHA1

    a37cd82dd4def1b73dc06c3a9f8210b884f64d46

  • SHA256

    0c64978cf7ffc6b2ceaa4992de7ae4a05575babd79bcfecb57cc74ac3848ddde

  • SHA512

    7d89c10193ea753e6a4206b0df15d0897b57a56ae53137d715efec724d754a38dd68eeb0ff11d9b9fd12afa54c51425252a541f5bd97a129304491ff33db5fd9

  • SSDEEP

    3072:rWUYAlmXkJr4Dul8kZyLA93qlUD2mvwV6bFcHSRoodGv8Z36CxVYwwBJ785v7W8+:zsBi17NCFYp3rtHmqbK65Y

Malware Config

Extracted

Family

warzonerat

C2

185.140.53.41:2104

Targets

    • Target

      c67c1797ac06edcba5d78083ba87b357

    • Size

      236KB

    • MD5

      c67c1797ac06edcba5d78083ba87b357

    • SHA1

      a37cd82dd4def1b73dc06c3a9f8210b884f64d46

    • SHA256

      0c64978cf7ffc6b2ceaa4992de7ae4a05575babd79bcfecb57cc74ac3848ddde

    • SHA512

      7d89c10193ea753e6a4206b0df15d0897b57a56ae53137d715efec724d754a38dd68eeb0ff11d9b9fd12afa54c51425252a541f5bd97a129304491ff33db5fd9

    • SSDEEP

      3072:rWUYAlmXkJr4Dul8kZyLA93qlUD2mvwV6bFcHSRoodGv8Z36CxVYwwBJ785v7W8+:zsBi17NCFYp3rtHmqbK65Y

    • Modifies Windows Defender Real-time Protection settings

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Warzone RAT payload

    • Windows security modification

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Defense Evasion

Modify Registry

2
T1112

Impair Defenses

2
T1562

Disable or Modify Tools

2
T1562.001

Tasks