General

  • Target

    bd052b6fcba494c12b9a953f2281516baf663f1dd89568c762bc089faf466913

  • Size

    4.2MB

  • Sample

    240814-ksrx6ayaln

  • MD5

    d55ecd80d2ec6fa9e2dcf1965fbac00e

  • SHA1

    f9729d435ba0b1025c8bbec8557f96ccb4c01a61

  • SHA256

    bd052b6fcba494c12b9a953f2281516baf663f1dd89568c762bc089faf466913

  • SHA512

    8ffe77f51471c2073d57b48d3ce29507bc6542dd1b357cbc17e0836bc5e47a60095647e059700e4c46e03dc59fea54962574253af961ad34e512ee090b767b92

  • SSDEEP

    98304:r0HyeSxnMFSjcFx2eR/8n5aX6EK7SZ0lW9mNOLfIAx:4SegnfMgCuc/YSJ9mNOLgAx

Malware Config

Extracted

Family

warzonerat

C2

victorybelng.ddns.net:13900

Targets

    • Target

      INV-20230822.cmd

    • Size

      4.7MB

    • MD5

      073eda398bb992c245ea72ba948282af

    • SHA1

      60b8af064e8beae96829cc62fad8a0f34e745145

    • SHA256

      c37739fd8d58467e960f81f0f5260b45ec23d4c772d3e3cbb0c3d42089fdf6ee

    • SHA512

      a75001cd01d9a1260bf01d9320df596e490a6fd8ad9ca2921bdb67464422613ca94425dcd1f1db673acf9e471b1a1ed4cb6856acb99dd3fd2383c2c4131c4449

    • SSDEEP

      98304:4v8upB6APFAYS8ILk65Hxp44MVghKrVy+dr5/FtqvG:O8upg+GYCkf4qg4h/FQvG

    • WarzoneRat, AveMaria

      WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

    • Warzone RAT payload

    • Suspicious Office macro

      Office document equipped with macros.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks