General

  • Target

    dbea3dd4d4c4211bb00b2c9cee809a50c0b149a436ea1f92f749637780c474de

  • Size

    722KB

  • Sample

    240417-rxte4scc24

  • MD5

    9b4ff975188a9123e5c239fe74de8fb4

  • SHA1

    883dd47dcb17b8066b8ce0727c0de3d2dcd34b98

  • SHA256

    dbea3dd4d4c4211bb00b2c9cee809a50c0b149a436ea1f92f749637780c474de

  • SHA512

    1dd8759bdfaabd1fccb77275d02b5c29b0c38213487c388bcdaf93a677786e80f1a7e27034c5d1bebc71e786aa553441887f66bb49f3c87927f925b112548829

  • SSDEEP

    12288:QwJjhNzUAF81nL+CX7bxnM6july/qUTIHiS8BMTWRJ82YkT4OXg+0AUcLclVZGVU:QwJ1NzXW1aS7dnMPs/qksK89UXgdcIVp

Malware Config

Extracted

Family

warzonerat

C2

45.137.22.105:4821

Targets

    • Target

      90b0e81cae870478e28e0902f8011e63315394fab478fb790827d95d1c34ba6f.exe

    • Size

      938KB

    • MD5

      e91ffadc5a9582e57acbd29aa9b2b97f

    • SHA1

      d8cc3d7f79e8a09a15759b3de91406eff847eb46

    • SHA256

      90b0e81cae870478e28e0902f8011e63315394fab478fb790827d95d1c34ba6f

    • SHA512

      01f97b61a2cf50f70e34b8d68493e99f1828705f50cc894c2fc8826393b6de71a899920cbd8500b5994c39d955024cdc3daa474b64961c331529d93ddb150263

    • SSDEEP

      24576:V8IH/5Tc2NLJlVSDiCb+Q8iAqaQddq9rDy08o:XHhA2N97SmCb+Q8HEADD8o

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Persistence

Scheduled Task/Job

1
T1053

Privilege Escalation

Scheduled Task/Job

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks