General

  • Target

    ORDER883274777724884pdf.vbs

  • Size

    19KB

  • Sample

    240806-gm4szsvfqh

  • MD5

    7e2ef2525a8c587529e9b0dae21f3709

  • SHA1

    75e91eb1ecefa8ffa43b766ce5ef36df88c1887c

  • SHA256

    d7190b79fb6e5d8687b4189bd2fbebb275530fb80f89569770a4d6cec5e0061e

  • SHA512

    93b6dac71d4a59bdfc03b8c4ecc8795de1b8844c29cd5fcc4ee1f843df18cf60a7c62fd5a7d9c71c4fa9979e0e4768a6b6bf8abc1168aaccbdf187dd71075071

  • SSDEEP

    384:HhnrLUNd/atj/K3wSGkPJmxNSiMFpWrd2Wx3l4cgb1:HhnfrtjS3dGwW2wzxl4Pp

Malware Config

Extracted

Family

warzonerat

C2

mad.pzg-peru.com:77

Targets

    • Target

      ORDER883274777724884pdf.vbs

    • Size

      19KB

    • MD5

      7e2ef2525a8c587529e9b0dae21f3709

    • SHA1

      75e91eb1ecefa8ffa43b766ce5ef36df88c1887c

    • SHA256

      d7190b79fb6e5d8687b4189bd2fbebb275530fb80f89569770a4d6cec5e0061e

    • SHA512

      93b6dac71d4a59bdfc03b8c4ecc8795de1b8844c29cd5fcc4ee1f843df18cf60a7c62fd5a7d9c71c4fa9979e0e4768a6b6bf8abc1168aaccbdf187dd71075071

    • SSDEEP

      384:HhnrLUNd/atj/K3wSGkPJmxNSiMFpWrd2Wx3l4cgb1:HhnfrtjS3dGwW2wzxl4Pp

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Warzone RAT payload

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks