General

  • Target

    16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118

  • Size

    127KB

  • Sample

    240505-kgkdyacd5x

  • MD5

    16d7cfecc0d1f44bcf020b5d2c900a64

  • SHA1

    8170d4759a48ae196102b921dc7b89b3bda27886

  • SHA256

    d9577922518c5fd98ec3518daa760289edf5e1151a7aea86e528606dde7563fb

  • SHA512

    a8d69562b780389afe4fa02b16f12577c4654657863fabbdddec721d48194690270f1ea74fe1fa1981577cfa84c77585d765213c3318ecab40018ca7d62fa281

  • SSDEEP

    3072:SCbz/KdJp8JZHIpKx+KDMbrfpaIeiX4d2Vzv9z/ri:SC+fFpWMXUCRVD9/

Malware Config

Extracted

Family

warzonerat

C2

asdfwrkhl.warzonedns.com:5200

Targets

    • Target

      16d7cfecc0d1f44bcf020b5d2c900a64_JaffaCakes118

    • Size

      127KB

    • MD5

      16d7cfecc0d1f44bcf020b5d2c900a64

    • SHA1

      8170d4759a48ae196102b921dc7b89b3bda27886

    • SHA256

      d9577922518c5fd98ec3518daa760289edf5e1151a7aea86e528606dde7563fb

    • SHA512

      a8d69562b780389afe4fa02b16f12577c4654657863fabbdddec721d48194690270f1ea74fe1fa1981577cfa84c77585d765213c3318ecab40018ca7d62fa281

    • SSDEEP

      3072:SCbz/KdJp8JZHIpKx+KDMbrfpaIeiX4d2Vzv9z/ri:SC+fFpWMXUCRVD9/

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Drops startup file

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks